Blog
Quick heal blog

Again! A New .NET Ransomware Shrug2

Estimated reading time: 5 minutes

For several months, Quick Heal Security Labs has been observing an increase in ransomware which are built in  .NET framework. Ransomware like SamSam, Lime and now Shrug was found to be built in .NET framework. Malware authors are finding it very easy to build and obfuscate malware in .NET framework rather than making them in...

Beware of the Armage Ransomware – the File Destroyer!

  • 12
    Shares
 August 8, 2018

Estimated reading time: 3 minutes

In July last week, Quick Heal Security Labs detected a new ransomware called Armage. It appends ‘.Armage’ extension to files it encrypts. Armage ransomware uses the AES-256 encryption algorithm to encode files making them inoperable. It spreads via spam emails and corrupted text files. Technical analysis Once executed on the...

Data Privacy. What is that?

  • 15
    Shares
 August 6, 2018

Estimated reading time: 2 minutes

With the heavy penetration of the Internet into almost every household, data privacy has had its day. The Facebook data leak scandal which rocked the tech industry is a blistering example of the way our privacy is getting compromised at the cost of our obsession with social networking or the...

Quick Heal Total Security (Windows) achieves a 99.5% protection rate in AV-Comparatives’ test

  • 44
    Shares
 July 23, 2018

Estimated reading time: 2 minutes

Quick Heal Total Security (Windows) has achieved a 99.5% protection rate in the Real-World Protection Test conducted by world’s leading security software testers AV-Comparatives. Real-World Protection Test February-June 2018 Experts at AV-Comparatives create a real-world environment to test security software. In this environment, malware (malicious software) behave in the same...

Your copy-paste habit can cost you your money

  • 19
    Shares
 July 19, 2018

Estimated reading time: 4 minutes

How often do you store your important data in files? It’s very common, right? This data may be URLs, topics, personal data like contacts, email-ids, usernames of different portals and sometimes passwords too (though always recommended to not to do so). We very casually copy this data and paste it...