Blog

Cyber crime

Ransomware Getting Delivered Using Script Files
The ransomware threat has significantly grown over time. Each day, a new variant gets added to the ransomware family. Malware are usually delivered through exploit kits and spam emails. Speaking of spam emails, they are either loaded with malicious document files installing the malware or malware directly inside a ZIP...
7-Important-Ransomware-FAQs-that-you-must-know_
There can be no two way to the fact that Ransomware has easily become one of the biggest banes of digital security for individual users and enterprises alike. Ransomware is a malware that locks an infected computer or encrypts its files (converts the files into an unreadable form). It then...
How to Protect Yourself from ATM Skimming_tips_security
It so happens that a vacation taken by a cyber security expert turns out to be yet another eye-opener for many. While holidaying in Vienna, Austria, cyber security expert Benjamin Tedesco comes across a well-camouflaged ATM skimming machine. Before we continue, let us tell you a little about what is...
Kovter_the_fileless_click_fraud_malware
Kovter Trojan has been in effect since 2013. Being fileless, Kovter is different and stealthier than other Trojan families. It employs various anti-debugging, anti-VM, anti-sandboxing techniques, and has checks for identification of different security analysis tools. It uses different encryption techniques for different purposes. Like other Trojans, Kovter gathers user...
quick-heal-labs-report-on-targeted-attack-named-m_project
At Quick Heal Labs, we are tracking a targeted attack dubbed as ‘m_project’. Initially, attackers used malicious Microsoft Excel documents to infiltrate the targeted system. Presently, attackers are also using malicious Microsoft Office RTF files which exploit a security vulnerability which is very popular among hackers; it is called ‘CVE...