Blog

Malware

8 tips to avoid a spyware attack

  • 91
    Shares
 April 12, 2018

Estimated reading time: 2 minutes

Spyware refers to software that spy on your Internet browsing activities, record keystrokes, and collect almost any type of data including your personal information such as credit/debit card or banking details, login IDs and passwords. In this post, we share 8 tips to avoid a spyware attack and keep your...

An in-depth analysis of a new, emerging “.url” malware campaign – by Quick Heal Security Labs

  • 2
    Shares
 March 19, 2018

Estimated reading time: 5 minutes

Last week, we had blogged about the emergence of a new attack vector ‘.url’ which is used to spread malware. In this blog post, we will deep-dive into the attack chain of this ‘.url’ vector and elaborate on the Quant Loader malware which is actively making use of it. Let’s...

A free guide to 7 computer viruses you should know about

  • 36
    Shares
 March 13, 2018
7_computer_viruses_you_should_know_about

Estimated reading time: 4 minutes

Computer viruses are nasty little programs that are designed to lay waste to your computer. Some destroy files stored on your PC, while some trigger different software to malfunction. More nefarious viruses steal your confidential information and some even go to an extent to rig a system’s power load and...

The Runner: a key component of the SamSam ransomware campaign – An analysis by Quick Heal Security Labs

 February 8, 2018

Estimated reading time: 4 minutes

In Jan 2018, Greenfield, Indiana-based Hancock Health (healthcare network) was attacked by SamSam ransomware. It encrypted the files containing patients’ data which disrupted their critical services. Even though SamSam is not a new ransomware, it has evolved over a period of time. We had observed its first variant in Feb...

IcedID – a new sophisticated banking Trojan: a technical analysis by Quick Heal Security Labs

  • 2
    Shares
 November 29, 2017

Estimated reading time: 4 minutes

IcedID is a new player in the banking Trojan family. It has a modular architecture and capable of stealing banking credentials of the user by performing a man-in-the-middle attack (MITM). IcedID sets up a local proxy and redirects all Internet traffic through it. Additionally, it can download and execute components...

A Report by Quick Heal Labs on Password Stealing Malware

  • 4
    Shares
 May 19, 2016

Estimated reading time: 1 minute

Almost every computer user has more than one account for social networking sites, email accounts, bank accounts, online shopping portals, etc. And for obvious reasons, it becomes difficult for them to remember their login credentials, and this gives away to a habit of saving username and passwords in web browsers,...

Security Vulnerabilities for Android and iOS Hit An All-time High in 2015

  • 1
    Share
 December 4, 2015

Estimated reading time: 4 minutes

Quick Heal hopes it has been a good year for you. But, has it been a good year for your mobile devices as well? It has been an alarming year for both Android and iOS users. If Android users were vulnerable to Stagefright attacks, iOS users had their own share...

5 Common Myths that Stop People from Using an Antivirus

 August 26, 2014

Estimated reading time: 3 minutes

While this may seem like a bit of an odd subject to venture into, in this blog post we will list out some common reasons, or excuses, why you don’t really need antivirus or an effective computer security for your home PC. Out of the millions of computer users around...