Estimated reading time: 2 minutes
Quick Heal Threat Research Lab has recently observed an active cybercrime campaign designed to steal user info. The campaign has been noticed to make use of three keyloggers (malicious software that records information entered by a user on their computer keyboard) iSpy logger, Predator logger and Knight Logger. These software...May 2016
Stay away from ‘WhatsApp Gold’ – It’s a fake app!
Estimated reading time: 2 minutes
If you haven’t yet heard of the ‘WhatsApp Gold’ app, you soon will. And we are here to tell you that, this is yet another scam planned by cyber crooks. Users of popular messaging app WhatsApp, are reporting about receiving a message that advertises a newly launched app called WhatsApp...Have a LinkedIn account? Better change your password!
Estimated reading time: 2 minutes
Last week, popular business social networking site LinkedIn announced that over 100 million user passwords were compromised. This was followed by a strong advisory to users about changing their passwords. A brief flashback >> A few years ago, in 2012, LinkedIn was hit by a major hack that caused a...A Report by Quick Heal Labs on Password Stealing Malware
Estimated reading time: 1 minute
Almost every computer user has more than one account for social networking sites, email accounts, bank accounts, online shopping portals, etc. And for obvious reasons, it becomes difficult for them to remember their login credentials, and this gives away to a habit of saving username and passwords in web browsers,...Malware Alert! Beware of Fake Emails with the subject line ‘Amazon Order Dispatched…’
Estimated reading time: 2 minutes
After you are done shopping on any e-commerce website, receiving a confirmation email about your purchase is an expected thing. But, if you are receiving any such confirmation emails whose sender seems to be a popular online shopping portal and are mostly blank but contain attachment(s), then be cautious. Many...The New and Latest Version of Quick Heal is here!
Estimated reading time: 1 minute
Our readers would be glad to know that the new and enhanced version of the Quick Heal product series is here! Based on the various feedback and suggestions received from our users across the world, we have brought in some major enhancements to this year’s product line and also introduced...Ramnit Malware: Improvising its weapons
Estimated reading time: 3 minutes
Ramnit was introduced as a worm into the cyber world during the end of 2010. In these few years, researchers at Quick heal Labs have observed a drastic change in the components of this malware. Malware authors of this family are continuously upgrading to adapt to the changing needs of...Bladabindi Malware Abusing Pastebin.com as Infection Vector
Estimated reading time: 7 minutes
Earlier, malware authors kept their payloads on Command and Control (C&C) servers or compromised websites. And to do this, they had to setup their C&C server or compromise a genuine website. But now, they don’t need to bother about such things, as they have started using genuine file sharing sites...7 Useful Computer Security Habits you Must Take Up
Estimated reading time: 4 minutes
Here’s a light, crisp refresher on 7 good computer security habits for you all. #1st Tip Lock your PC when you are away This is a no-brainer; yet, most of us may conveniently forget to do so. And we don’t realize its importance until some miscreant gets their hands on...INFOGRAPHIC: The State of Passwords in 2015
Estimated reading time: 1 minute
UPDATE – May 5th, 2016 Achieving cyber security is getting harder every year, and the most critical aspect of this process is passwords. With so many different passwords to remember for every individual, there are several loopholes which need to be secured. Have a look at the infographic below to...