Blog

December 2017

Cybersecurity Predictions: What to expect in 2018

  • 54
    Shares
1 Comment
Cybersecurity prediction for 2018

Estimated reading time: 7 minutes

Get ready! 2018 is going to be much worse for cybersecurity than what it was for 2017. Before we get on with the cybersecurity predictions for 2018, let’s take a quick flashback of 2017 2017 was riddled with cybersecurity mayhem: WannaCry – the biggest ransomware attack in history; took down...

5 cybersecurity tips for safe online shopping this holiday season

  • 37
    Shares
1 Comment

Estimated reading time: 3 minutes

By now, most of you must have started getting emails and messages about great deals and discounts from your online shopping websites. And while most of us get preoccupied with our shopping spree, cyber criminals will try to make the most of this opportunity. How? Well, that’s easy. They might...

Beware of fake apps that claim to link your mobile number to Aadhaar

  • 40
    Shares
1 Comment

Estimated reading time: 4 minutes

Are you looking for ways to avoid visiting your cellular network provider’s care center/store to get your Aadhaar linked to your mobile number? Have you recently searched for apps that can help you do this? Well, here is some important and useful information for you. It is now mandatory for...

Android ransomware demands iTunes gift cards as a ransom – an analysis by Quick Heal Security Labs

  • 27
    Shares
0

Estimated reading time: 4 minutes

Typically, a ransomware will demand money or cryptocurrency after it has locked down your computer or phone or encrypted its data. But, Quick Heal Security Labs has spotted an Android ransomware that demands iTunes gift cards after it locks down the infected device. These gift cards can be sold on...

Quick Heal Total Security receives BEST+++ certification from AVLab in Fileless Malware Protection Test

0

Estimated reading time: 2 minutes

AVLab is an independent organization that conducts tests on security software for corporate networks and individual user devices. These tests are conducted by using malicious software, tools, and bypassing security techniques that are used in real cyberattacks. In October 2017, AVLab conducted a Fileless Malware Protection Test. In this test,...

An emerging trend of DDE based Office malware – an analysis by Quick Heal Security Labs

  • 41
    Shares
0

Estimated reading time: 3 minutes

For the past few years, we have been seeing macro-based attacks through Object Linking Embedding (OLE)/Microsoft Office files. But, presently, attackers are using a different technique to spread malware through Office files – using a new attack vector called ‘Dynamic Data Exchange (DDE)’. DDE is an authorized Microsoft Office feature that provides several methods for transferring data between applications. Once the communication protocol is established, it doesn’t require user interactions...

Beware of fake social media messages that talk about SMS-based Aadhaar-LIC linking

  • 72
    Shares
0

Estimated reading time: 2 minutes

You might be aware that LIC policyholders must now link their Aadhaar and PAN to their policies according to a directive issued by the Government of India. The deadline for the Aadhaar-LIC linking is December 31, 2017. And unsurprisingly, fraudsters have started misusing this news to their advantage. How? Read...