Blog

May 2016

Infostealer Campaign detected in the wild

  • 1
    Share
0

Estimated reading time: 2 minutes

Quick Heal Threat Research Lab has recently observed an active cybercrime campaign designed to steal user info. The campaign has been noticed to make use of three keyloggers (malicious software that records information entered by a user on their computer keyboard) iSpy logger, Predator logger and Knight Logger. These software...

Stay away from ‘WhatsApp Gold’ – It’s a fake app!

  • 297
    Shares
29

Estimated reading time: 2 minutes

If you haven’t yet heard of the ‘WhatsApp Gold’ app, you soon will. And we are here to tell you that, this is yet another scam planned by cyber crooks. Users of popular messaging app WhatsApp, are reporting about receiving a message that advertises a newly launched app called WhatsApp...

Have a LinkedIn account? Better change your password!

  • 175
    Shares
93

Estimated reading time: 2 minutes

Last week, popular business social networking site LinkedIn announced that over 100 million user passwords were compromised. This was followed by a strong advisory to users about changing their passwords. A brief flashback >> A few years ago, in 2012, LinkedIn was hit by a major hack that caused a...

A Report by Quick Heal Labs on Password Stealing Malware

  • 4
    Shares
1 Comment

Estimated reading time: 1 minute

Almost every computer user has more than one account for social networking sites, email accounts, bank accounts, online shopping portals, etc. And for obvious reasons, it becomes difficult for them to remember their login credentials, and this gives away to a habit of saving username and passwords in web browsers,...

Malware Alert! Beware of Fake Emails with the subject line ‘Amazon Order Dispatched…’

  • 60
    Shares
3

Estimated reading time: 2 minutes

After you are done shopping on any e-commerce website, receiving a confirmation email about your purchase is an expected thing. But, if you are receiving any such confirmation emails whose sender seems to be a popular online shopping portal and are mostly blank but contain attachment(s), then be cautious. Many...

The New and Latest Version of Quick Heal is here!

  • 63
    Shares
7

Estimated reading time: 1 minute

Our readers would be glad to know that the new and enhanced version of the Quick Heal product series is here! Based on the various feedback and suggestions received from our users across the world, we have brought in some major enhancements to this year’s product line and also introduced...

Ramnit Malware: Improvising its weapons

  • 2
    Shares
2

Estimated reading time: 3 minutes

Ramnit was introduced as a worm into the cyber world during the end of 2010. In these few years, researchers at Quick heal Labs have observed a drastic change in the components of this malware. Malware authors of this family are continuously upgrading to adapt to the changing needs of...

Bladabindi Malware Abusing Pastebin.com as Infection Vector

  • 1
    Share
0

Estimated reading time: 7 minutes

Earlier, malware authors kept their payloads on Command and Control (C&C) servers or compromised websites. And to do this, they had to setup their C&C server or compromise a genuine website. But now, they don’t need to bother about such things, as they have started using genuine file sharing sites...

7 Useful Computer Security Habits you Must Take Up

  • 74
    Shares
29

Estimated reading time: 4 minutes

Here’s a light, crisp refresher on 7 good computer security habits for you all. #1st Tip Lock your PC when you are away This is a no-brainer; yet, most of us may conveniently forget to do so. And we don’t realize its importance until some miscreant gets their hands on...

INFOGRAPHIC: The State of Passwords in 2015

  • 2
    Shares
17
world password day

Estimated reading time: 1 minute

UPDATE – May 5th, 2016 Achieving cyber security is getting harder every year, and the most critical aspect of this process is passwords. With so many different passwords to remember for every individual, there are several loopholes which need to be secured. Have a look at the infographic below to...