Blog

August 2016

Beware of Fake Being SalMan Apps

  • 124
    Shares
29

Estimated reading time: 2 minutes

The first ever Bollywood celebrity game is out and is based on none other than the superstar who never fails to take the entire country by storm in every new flick he does.We are talking about the mobile game app called ‘Being SalMan’ whose launch was recently announced by Salman...

New Variant of Zepto Ransomware Detected in the Wild

  • 1
    Share
4

Estimated reading time: 2 minutes

We have come across a new variant of the Zepto ransomware family. It is spreading rampantly through malspam (malicious spam) and other vectors such as exploit kits. The new variant has a few minor changes in it; the most apparent one is a change in the payload file type. The...

INFOGRAPHIC: How can SMS Spam Harm You?

  • 96
    Shares
24

Estimated reading time: 1 minute

The dangers of SMS spam are not taken seriously by most of us. And this is where fraudsters find their window of opportunity. SMS spam is defined as unwanted text messages and they are not just limited to the traditional SMS (short messaging service) anymore. With the arrival of instant...

How to Recover Files After a Ransomware Attack?

  • 15
    Shares
21
Recover data after a ransomware attack

Estimated reading time: 2 minutes

What if you know your data is securely backed up when a ransomware strikes and you don’t have to worry about recovering your files? The Backup and Restore feature of Quick Heal helps you achieve this. What is a Ransomware? Ransomware is a malware that either locks an infected computer...

Ransomware Getting Delivered Using Script Files

2

Estimated reading time: 2 minutes

The ransomware threat has significantly grown over time. Each day, a new variant gets added to the ransomware family. Malware are usually delivered through exploit kits and spam emails. Speaking of spam emails, they are either loaded with malicious document files installing the malware or malware directly inside a ZIP...

Troldesh Ransomware brute-forcing its way into systems

  • 19
    Shares
4

Estimated reading time: 3 minutes

Ransomware creators deploy more than just one way to trap their victims. These include malicious email attachments, infected links, malvertising, and exploit kits. However, over the past few weeks, we have been observing criminals using a new carrier to deliver the ransomware malware. It mainly affects Windows Server Operating Systems....

7 Important Ransomware FAQs that you must know

  • 152
    Shares
70

Estimated reading time: 3 minutes

There can be no two way to the fact that Ransomware has easily become one of the biggest banes of digital security for individual users and enterprises alike. Ransomware is a malware that locks an infected computer or encrypts its files (converts the files into an unreadable form). It then...

Quick Heal v16.00 and above supports the Windows 10 Anniversary Update

  • 4
    Shares
8

Estimated reading time: 1 minute

A year ago, Microsoft launched Windows 10 and it created quite a spur among PC users all around the world. Celebrating the anniversary of this launch, Microsoft has begun rolling out what it is calling the Windows 10 Anniversary Update. This post lists some of the highlights of this update...