Blog

April 2018

Ransomware Alert! Follow these steps to secure your system against an ongoing ransomware attack

  • 3
    Shares
0

Estimated reading time: 4 minutes

Quick Heal has detected an ongoing ransomware attack. This post outlines the important steps you must take to protect your computer(s) against this threat. What to do to stay safe from the attack? Most of the steps mentioned below are technical in nature. If you need any assistance, please call...

How important are security patches and updates

  • 73
    Shares
0

Estimated reading time: 3 minutes

Security vulnerabilities are increasing and just not so long before, we had to deal with so many of them. Remember WannaCry? In this post, we will discuss some important case in points with respect to security vulnerabilities and how important are security patches and updates. The WannaCry scare The biggest...

Dharma ransomware resurfaces with a new variant

  • 42
    Shares
0

Estimated reading time: 3 minutes

A new variant of the Dharma ransomware (‘.arrow’) has been observed in the wild. This variant appends the extension ‘.arrow’ to the files it encrypts and spreads via spam emails.   How Dharma encrypts its victim’s files Once executed, the ‘.arrow’ variant of Dharma uses the below command to disable...

8 tips to avoid a spyware attack

  • 7
    Shares
0

Estimated reading time: 2 minutes

Spyware refers to software that spy on your Internet browsing activities, record keystrokes, and collect almost any type of data including your personal information such as credit/debit card or banking details, login IDs and passwords. In this post, we share 8 tips to avoid a spyware attack and keep your...

Can you spot a phishing email? Take this test and find out!

  • 1
    Share
61

Estimated reading time: 3 minutes

One of the oldest, nastiest and most lucrative tools used by hackers is phishing – a method to fool you into revealing your personal and sensitive information such as debit/card numbers, passwords, ATM pin, date of birth – any data that can personal identify you. Here’s an example of a...

Can you solve this cybersecurity crossword?

  • 1
    Share
0

Estimated reading time: 1 minute

Do you like solving crosswords? Well, we have a short cybersecurity crossword that will rattle your brain and also test how cyberaware you are.