Blog
Quick heal blog

Beware of fake apps that claim to help you invest in JioCoin

  • 26
    Shares
 February 2, 2018

Estimated reading time: 2 minutes

After news of Reliance Jio to launch its own cryptocurrency Jio emerged, a bunch of scammers seemed to have sprung into action. The Google Play Store was recently flooded with fake apps claiming to help users invest in JioCoin. And not long after this, Reliance issued an official statement rubbishing...

WhatsApp Scam Alert! Do not be fooled by this new scam

  • 425
    Shares
 January 31, 2018
WhatsApp_Scam_Alert

Estimated reading time: 1 minute

This is a quick advisory to warn our readers about a new WhatsApp scam that is afoot. In this scam, a fake message is getting circulated which informs a user that their WhatsApp subscription has expired and that they can buy a lifetime service just for 99p by clicking on...

New fake resume email campaign infecting users with the SmokeLoader malware

  • 22
    Shares
 January 29, 2018

Estimated reading time: 4 minutes

Email attachments are a favorite medium for attackers to deliver malware. They can be used to target a specific user or multiple users at the same time by launching spam email campaigns. To succeed in carrying out an intended malware attack, it is necessary that recipients of the malicious email...

On Data Privacy Day, here are 10 simple tips to keep your data safe

  • 231
    Shares
 January 25, 2018

Estimated reading time: 4 minutes

Recognized annually on January 28th, Data Privacy Day is defined as a centered approach towards respecting privacy, safeguarding data, and enabling trust. It is a global effort to raise and promote awareness around protecting one’s data and privacy. With this thought in mind, we have put together these 10 tips...

In-browser Cryptojacking at full throttle – A report by Quick Heal Security Labs

  • 29
    Shares
 January 23, 2018

Estimated reading time: 4 minutes

Cryptocurrencies like Bitcoin, Monero, Ethereum, Litecoin, and Tezos are in full swing. And they have exponentially increased cryptocurrency mining (or cryptomining) activities. Previously, cryptomining was carried out by powerful and dedicated mining hardware or by utilizing distributed computing because the entire process requires a lot of computation. However, there has been an observable change in the mining trends. Now, web browsers are taking part in cryptomining and its activity is growing because...

Beware of fake cryptocurrency mining apps – a report by Quick Heal Security Labs

  • 34
    Shares
 January 18, 2018

Estimated reading time: 4 minutes

Cryptocurrency has become a famous and valuable digital asset. One of the ways to earn cryptocurrencies is to mine them. New coins are generated and brought into the market through the process of mining. Mining of cryptocurrency is a resource-intensive task but mining them on mobile devices is still a...

Scam Alert! Beware of online surveys promising free iPhone X

  • 32
    Shares
 January 16, 2018

Estimated reading time: 3 minutes

Ever came across an online survey that promised you a handsome prize? I did. And here’s what happened. While I was going about my daily work on the Internet, I came across the below page.   As you can see, I received a congratulatory message for being a loyal Google...

Quick Heal thwarts attempts of a JAVA jRAT phishing campaign targeting an international embassy in India

  • 35
    Shares
 January 16, 2018

Estimated reading time: 4 minutes

Earlier we had blogged about how JAVA based jRAT malware were evolved in the recent times. At Quick Heal Security Labs, we are actively observing jRAT campaigns happening in the wild. These JAVA malware spread through phishing campaigns. While analyzing one such phishing campaign, we found that an International embassy in India was being targeted by phishers. The malware used in the phishing campaign was the infamous JAVA malware called jRAT. ...

Virus Infectors: a perpetual attack vector – A report by Quick Heal Security Labs

 January 12, 2018

Estimated reading time: 5 minutes

2017 was the year of ransomware and cryptocurrency miners but we are still seeing infectors posing as a prominent attack vector. However, old infectors still remain a significant threat to users. In 2017, we observed a few old infector families making new versions of their old code, though no new...

Chrome extensions exploited in a massive PUA campaign

  • 39
    Shares
 January 11, 2018

Estimated reading time: 4 minutes

Browser extensions also known as add-ons or plug-ins are programs that extend the functionality of a web browser making it more convenient to use and giving a better browsing experience. Browser extensions are commonly used to Enhance the appearance as per convenience Add to the functionality of the browser Incorporate...