Blog

News

  • 134
    Shares
 June 27, 2016
ATM_Skimming

Estimated reading time: 2 minutes

It so happens that a vacation taken by a cyber security expert turns out to be yet another eye-opener for many. While holidaying in Vienna, Austria, cyber security expert Benjamin Tedesco comes across a well-camouflaged ATM skimming machine. Before we continue, let us tell you a little about what is...
  • 36
    Shares
 June 6, 2016
smartphone security

Estimated reading time: 2 minutes

Just like the private sector, the Government has been encouraging its employees to use smartphones for better collaboration within departments. This rapid adoption of smartphones and Internet services in Government organizations might lead to situations where national security could be compromised by a simple data breach. This is a concern...
  • 1
    Share
 May 30, 2016

Estimated reading time: 2 minutes

Quick Heal Threat Research Lab has recently observed an active cybercrime campaign designed to steal user info. The campaign has been noticed to make use of three keyloggers (malicious software that records information entered by a user on their computer keyboard) iSpy logger, Predator logger and Knight Logger. These software...
  • 174
    Shares
 May 23, 2016

Estimated reading time: 2 minutes

Last week, popular business social networking site LinkedIn announced that over 100 million user passwords were compromised. This was followed by a strong advisory to users about changing their passwords. A brief flashback >> A few years ago, in 2012, LinkedIn was hit by a major hack that caused a...
  • 1
    Share
 March 28, 2016

Estimated reading time: 3 minutes

Quick Heal is proud to share that the PCSL IT Consulting Group has awarded the Quick Heal Mobile Security app with the title of “Android Security Recommended 2015”. This title is granted to Android mobile security vendors who received a 5-star monthly award at least twice during the course of...
 March 25, 2016

Estimated reading time: 5 minutes

“Dridex”, also known as ‘Buget’, is the successor of “Cridex”, a banking Trojan created for stealing victim credentials. After its takedown by the US Government in late 2015, the malware has come up with new versions and techniques. This report aims to provide detailed insights into the infection vector of...

Estimated reading time: 2 minutes

It has been brought to our notice that some of our users are facing a technical issue wherein their computer hangs up/freezes after performing a restart. This post explains the steps to be taken to resolve this issue. Problem description: A certain group of Quick Heal users have reported that...
  • 2
    Shares
 March 3, 2016

Estimated reading time: 2 minutes

We’re honored to announce that ICSA Labs has named Quick Heal a 2016 Excellence in Information Security Testing Award recipient. ICSA Labs recognized Quick Heal for successful completion of five years of continuous ICSA Labs information security testing. The Excellence in Information Security Testing (EIST) Award honors organizations that have continually tested...
  • 9
    Shares
 February 17, 2016

Estimated reading time: 4 minutes

This is a precautionary advisory for all our readers who use Android smartphones. A Trojan detected by Quick Heal as Android.Xynyin.C, is known to have been injected into more than 60 gaming apps available in the Google Play Store. According to the intelligence reports received from our Malware Analysts, the...
 February 9, 2016

Estimated reading time: 3 minutes

In a landmark ruling, TRAI (Telecom Regulatory Authority of India) has come out in favor of net neutrality and upheld the integrity of a free Internet for one and all in the Indian telecom industry. TRAI has now banned broadband providers and mobile carriers from offering differential pricing to customers...