Blog
Quick heal blog

CVE-2018-15982- Adobe Flash Player use after free (Zero Day) vulnerability alert!

 December 6, 2018

Estimated reading time: 1 minute

The recent zero-day vulnerability CVE-2018-15982 in Adobe Flash Player enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSB18-42 on December 5, 2018 to address this issue. According to Adobe, the in-wild exploit is being used in targeted attacks. Vulnerable Versions Adobe...

Beware of getting scammed during Black Friday & Cyber Monday SALE!!

  • 7
    Shares
 November 23, 2018

Estimated reading time: 2 minutes

  As holiday shoppers gear up for a shopping spree on Black Friday and Cyber Monday, it’s important to be on alert to protect yourself from getting scammed. Here are few tips to help you enjoy a carefree and scam free holiday shopping season: Do not get tricked by similar...

Teaching kids the good, the bad and the ugly of the Internet

  • 60
    Shares
 November 14, 2018
happy-childrens-day-cybersecurity-internet-safety-tips

Estimated reading time: 3 minutes

This children’s day let’s talk about one of the most relevant topics for kids these days- the Internet! Children spend a lot of their time doing homework, talking to friends or playing games on the internet. For parents, it is more important than ever to teach their kids early on how...

This Diwali gift your kids online safety with parental control

  • 53
    Shares
 November 2, 2018

Estimated reading time: 3 minutes

Diwali holidays are just round the corner and your kids might have already received their holiday assignments. But, the kids are more excited about the fact that they will now have ample time to browse on the internet. While you want your kids to really enjoy the holidays, there’s a...

Obfuscated Equation Editor Exploit (CVE-2017-11882) spreading Hawkeye Keylogger

  • 15
    Shares
 November 1, 2018

Estimated reading time: 6 minutes

Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft’s equation editor exploit to spread Hawkeye keylogger. Cybercriminals use different techniques to steal confidential data. Now they are offering...

Ransomware attacks through Remote Access are on rise. Secure your system now!!

  • 28
    Shares
 October 26, 2018

Estimated reading time: 5 minutes

Once again ransomware attacks are on the rise and this can leave your systems vulnerable to critical data loss and breach. In fact, the recent outbreak of ransomware allows cyber criminals to easily gain access to your computer through Remote Desktop using brute-force technique, which is capable of cracking weak...

This festive season secure your mobile payments

  • 17
    Shares
 October 17, 2018

Estimated reading time: 2 minutes

Festivities in India have begun and it’s time for a joyride of celebrations, merriment, lots of tantalising food and exchange of gifts. Talking of food and gifts, the festive season is also a time for ecommerce sites to spring into action, by offering tempting discounts and sales to lure people...

Deep analysis of AZORult – The information exfiltrator

 October 16, 2018

Estimated reading time: 5 minutes

While the current focus in the cyberspace is on Ransomware and Cryptominers there are other prevalent threat actors silently making their way into victim’s machine in order to comprise it for malicious purpose. During the daily threat hunting task,Quick Heal Security labs came across a blocked URL by Quick Heal’s...

How to differentiate between spam and phishing emails?

  • 1
    Share
 October 11, 2018

Estimated reading time: 3 minutes

Emails today have become an integral part of our day-to-day life and this has made it a child’s play for spammers to lure people into opening fraudulent emails and attachments. Thus, while you are using emails for your everyday personal or official use, it is important to realize that the...