Blog

May 2018

[INFOGRAPHIC] 5 Myths about mobile security and facts that debunk them

  • 6
    Shares
0

Estimated reading time: 1 minute

When it comes to desktop computers, people go for the best security software. But when the talk is about their mobile security, odds are, they are least bothered. Most think that their mobile devices are less vulnerable to cyberattacks than their computers; that however, is a myth, and probably a...

Cryptocurrency mining rampage throttles Linux machines – an analysis by Quick Heal Security Labs

  • 1
    Share
0

Estimated reading time: 4 minutes

Quick Heal Security Labs recently came across a Linux-based Monero (XMR) miner. Monero (XMR) is one of the top 15 cryptocurrencies. It can be mined easily on any machine using its CPU computation power. This is one of the reasons why it is preferred to Bitcoin or Ethereum which are...

CVE-2018-4990 – Adobe Reader Double Free (Zero Day) vulnerability alert!

0

Estimated reading time: 1 minute

The recent zero-day vulnerability CVE-2018-4990 in Adobe Reader enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSB18-09 on May 14, 2018 to address this issue. According to Adobe, the in-wild attack is targeted and it impacts limited Windows users. Vulnerable versions...

Breed of MBR Infecting Ransomware – an analysis by Quick Heal Security Labs

0

Estimated reading time: 6 minutes

Ransomware is becoming one of the most perilous cyberattack methods and also the most habitual techniques for cybercriminals to earn money. It appears to have new weapons in its arsenal over time which is invariably aimed to boost its strength and enhance its business. As encrypting the files and restricting...

3 reasons you can’t live without your smartphone [VIDEO]

  • 1
    Share
0
3_reasons_you_can't_live_without_your_smartphone

Estimated reading time: 1 minute

Can you think of 3 reasons why you can’t live without your smartphone? Well, we tried figuring out the answer to that in this short video of ours. We also tried thinking what would happen if something bad happens to your phone and how can you avoid it. So, do...

CVE-2018-8174: Windows VBScript Engine Remote Code Execution Vulnerability – An advisory by Quick Heal Security Labs

0

Estimated reading time: 1 minute

The recent zero-day vulnerability in Windows VBScript Engine (CVE-2018-8174), enables attackers to perform a remote code execution on targeted machines. Microsoft has released a security advisory CVE-2018-8174 on May 8, 2018, to address this issue. According to Microsoft, it impacts most of the Windows Operating Systems. Vulnerable versions Windows 7 x86 and x64 versions Windows...

Twitter bug attack: All you need to know & ways to fight such attacks

  • 11
    Shares
0
twitter bug

Estimated reading time: 3 minutes

One company with a turnover of $2.44bn 330 million users 500 million tweets per day What does it take to bring an upheaval in such a magnanimous company? A bug and . . . . well, that’s all it needs! Twitter Inc. reported a bug encounter a few weeks ago....

Quick Heal supports the Windows 10 April 2018 Update

  • 1
    Share
0
Windows 10 April 2018 Update

Estimated reading time: 2 minutes

As part of the Windows 10 Updates, Microsoft has now come up with a new update for Windows 10 PCs. It’s called Windows 10 April 2018 Update. This post lists down some of the highlights of this particular update and Quick Heal’s compatibility with the OS. Highlights of the Windows...

An analysis of the Dharma ransomware outbreak by Quick Heal Security Labs

  • 25
    Shares
0

Estimated reading time: 7 minutes

On April 25, 2018, Quick Heal Security Labs issued an advisory on a new ransomware outbreak. We are observing a sudden spike of Dharma Ransomware. Even though Dharma ransomware is old, we observed its new variant which is encrypting files and appending the “.arrow” extension to it. Previously the encrypted...