Blog

March 2018

9 security tips for using mobile payment apps

  • 2
    Shares
3
9_safety_tips_for_making_secure_mobile_transactions

Estimated reading time: 2 minutes

Do you find it convenient to shop and bank online using mobile payment apps? Most would have ‘yes’ as an answer. But, are we letting ‘convenience’ overshadow ‘security’? An attacker can easily get hold of your personal and banking information if the app or the mobile site you are using...

Beware of the new WhatsApp message scam that promises Rs. 1000/- Paytm cash!

  • 4
    Shares
8

Estimated reading time: 4 minutes

WhatsApp currently has over 200 million monthly active users in India. No wonder it has become a popular tool for scammers. Just last night, I received the following message from one of my friends on WhatsApp. Fig 1 The message is in Hindi and loosely translates to this… Open this...

An analysis of the Zenis ransomware by Quick Heal Security Labs

0

Estimated reading time: 4 minutes

Quick Heal Security Labs has come across a new ransomware that goes by the name ‘Zenis’. The ransomware not only encrypts files but also intentionally deletes the infected system’s backup.   The behavior of Zenis ransomware Upon inside a computer, the ransomware performs the following checks before it starts encrypting...

The A-Z dictionary of cybersecurity terms

  • 59
    Shares
8

Estimated reading time: 8 minutes

Whether you are a normal user or a tech-guru, being aware of the computer security threats will help fortify your defense against them. So, here’s a handy A-Z dictionary of cybersecurity terms.

Email campaign using .url extensions to abuse Internet Explorer vulnerabilities (CVE-2016-3353)

  • 8
    Shares
1 Comment

Estimated reading time: 4 minutes

In the wild, malspam campaigns are a major medium to spread malware. Previously, we have written about such campaigns using MS Office files with malicious macro and using vulnerabilities. Recently, we observed a spam campaign that uses .url files as a first-stage downloader to spread malware and bypass security features....

A free guide to 7 computer viruses you should know about

  • 36
    Shares
34
7_computer_viruses_you_should_know_about

Estimated reading time: 4 minutes

Computer viruses are nasty little programs that are designed to lay waste to your computer. Some destroy files stored on your PC, while some trigger different software to malfunction. More nefarious viruses steal your confidential information and some even go to an extent to rig a system’s power load and...

Do not fall for the WhatsApp message about Jio Prime Offer. It’s a hoax!

  • 104
    Shares
6

Estimated reading time: 3 minutes

A message about a Jio Prime offer is circulating among WhatsApp users. Do not fall for it because it’s a hoax. Last evening, I received this message from one of my contacts. Looks like a genuine message, doesn’t it? But, it is nothing but a hoax. How do we know?...

Chinese, Russian hackers counting on Apache Struts vulnerabilities – a report by Quick Heal Security Labs

2

Estimated reading time: 4 minutes

Apache Struts is an open-source CMS based on MVC framework for developing Java EE Web Applications. Apache Struts has been widely used by many Fortune 100 companies and government agencies over the years for developing web applications. But, websites built using a CMS constantly need to upgrade the CMS versions in their web application servers, because vulnerabilities...