Blog
Quick heal blog

This Diwali gift your kids online safety with parental control

  • 46
    Shares
 November 2, 2018

Estimated reading time: 3 minutes

Diwali holidays are just round the corner and your kids might have already received their holiday assignments. But, the kids are more excited about the fact that they will now have ample time to browse on the internet. While you want your kids to really enjoy the holidays, there’s a...

Obfuscated Equation Editor Exploit (CVE-2017-11882) spreading Hawkeye Keylogger

  • 15
    Shares
 November 1, 2018

Estimated reading time: 6 minutes

Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft’s equation editor exploit to spread Hawkeye keylogger. Cybercriminals use different techniques to steal confidential data. Now they are offering...

Ransomware attacks through Remote Access are on rise. Secure your system now!!

  • 1
    Share
 October 26, 2018

Estimated reading time: 5 minutes

Once again ransomware attacks are on the rise and this can leave your systems vulnerable to critical data loss and breach. In fact, the recent outbreak of ransomware allows cyber criminals to easily gain access to your computer through Remote Desktop using brute-force technique, which is capable of cracking weak...

This festive season secure your mobile payments

  • 16
    Shares
 October 17, 2018

Estimated reading time: 2 minutes

Festivities in India have begun and it’s time for a joyride of celebrations, merriment, lots of tantalising food and exchange of gifts. Talking of food and gifts, the festive season is also a time for ecommerce sites to spring into action, by offering tempting discounts and sales to lure people...

Deep analysis of AZORult – The information exfiltrator

 October 16, 2018

Estimated reading time: 5 minutes

While the current focus in the cyberspace is on Ransomware and Cryptominers there are other prevalent threat actors silently making their way into victim’s machine in order to comprise it for malicious purpose. During the daily threat hunting task,Quick Heal Security labs came across a blocked URL by Quick Heal’s...

How to differentiate between spam and phishing emails?

  • 1
    Share
 October 11, 2018

Estimated reading time: 3 minutes

Emails today have become an integral part of our day-to-day life and this has made it a child’s play for spammers to lure people into opening fraudulent emails and attachments. Thus, while you are using emails for your everyday personal or official use, it is important to realize that the...

You’ve Been Hit By Ransomware. Now What?

  • 24
    Shares
 October 9, 2018

Estimated reading time: 3 minutes

“ALL YOUR FILES HAVE BEEN ENCRYPTED”   You see that line flashing on your laptop or desktop and suddenly your adrenaline level shoots up with hundreds of questions already hitting your mind… How Do I Remove that Message? Why Can’t I Access My System? Will I Lose All My Work?...

How can my Facebook account be misused if hacked?

  • 2
    Shares
 October 4, 2018

Estimated reading time: 2 minutes

At a time when most of us are living in a virtual world, where we are connected to our friends and family mostly through social networking sites, imagine what it would be like to find your social media account hacked!! That’s exactly what happened with 50 million of Facebook users...

Quick Heal supports the Windows 10 October 2018 Update

  • 1
    Share
 October 3, 2018

Estimated reading time: 2 minutes

As part of the Windows 10 Updates, Microsoft has now come up with a new update for Windows 10 PCs. It’s called Windows 10 October 2018 Update. This post lists down some of the highlights of this particular update and Quick Heal’s compatibility with the OS. Highlights of the Windows...

Emerging trend of spreading malware through IQY files

 October 3, 2018

Estimated reading time: 4 minutes

Nowadays attackers are searching for new techniques to spread malware, recently we came across a new emerging way to deliver malware through IQY file. Till now we had seen spread of malware through various file types and chains such as Word document, Script, JAVA files. Fig 1: Attack chain IQY file...