Blog
Quick heal blog

Satan ransomware raises its head again!

  • 7
    Shares
 June 20, 2018

Estimated reading time: 3 minutes

Satan ransomware first occurred in early 2017. And it has resurfaced with a new variant in 2018. We have seen it using new, innovative techniques to spread such as EternalBlue exploit to distribute over compromised networks.   This variant of Satan propagates using the below techniques: Mimikatz EternalBlue – exploit...

Cryptojacking is when someone illegally uses your PC to make digital money + 8 facts

  • 13
    Shares
 June 20, 2018

Estimated reading time: 4 minutes

What attracts more than a magnet? You might have guessed it right – it is money! And where there is easy money, there is a lot of hustle and bustle. Till now, ransomware was seen as the ultimate cash cow for attackers – kidnap critical data and ask a ransom...

CVE-2018-5002 – Adobe Flash Player Stack Buffer Overflow Vulnerability Alert!

  • 2
    Shares
 June 8, 2018

Estimated reading time: 1 minute

The recent zero-day vulnerability CVE-2018-5002 in Adobe Flash Player enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSB18-19 on June 7, 2018 to address this issue. According to Adobe, the in-wild exploit is being used in limited, targeted attacks and it...

Quick Heal detects banking Trojans imitating popular social media and banking apps in India

  • 26
    Shares
 June 5, 2018

Estimated reading time: 5 minutes

Quick Heal Security Labs has spotted two banking Trojan malware. These malware imitate some popular social and banking apps. While doing so, they gain access to some security permissions on the infected device which allow them to steal the user’s banking credentials. The malware are able to do this by...

6 reasons why your computer is slower than a snail

  • 53
    Shares
 June 5, 2018
Slow computer

Estimated reading time: 3 minutes

Is your computer slowing down? Do you find it easier to move a mountain than multitasking on your machine? Here are 6 possible reasons that might explain the poor performance of your computer.

[INFOGRAPHIC] 5 Myths about mobile security and facts that debunk them

  • 6
    Shares
 May 31, 2018

Estimated reading time: 1 minute

When it comes to desktop computers, people go for the best security software. But when the talk is about their mobile security, odds are, they are least bothered. Most think that their mobile devices are less vulnerable to cyberattacks than their computers; that however, is a myth, and probably a...

Cryptocurrency mining rampage throttles Linux machines – an analysis by Quick Heal Security Labs

  • 1
    Share
 May 22, 2018

Estimated reading time: 4 minutes

Quick Heal Security Labs recently came across a Linux-based Monero (XMR) miner. Monero (XMR) is one of the top 15 cryptocurrencies. It can be mined easily on any machine using its CPU computation power. This is one of the reasons why it is preferred to Bitcoin or Ethereum which are...

CVE-2018-4990 – Adobe Reader Double Free (Zero Day) vulnerability alert!

 May 16, 2018

Estimated reading time: 1 minute

The recent zero-day vulnerability CVE-2018-4990 in Adobe Reader enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSB18-09 on May 14, 2018 to address this issue. According to Adobe, the in-wild attack is targeted and it impacts limited Windows users. Vulnerable versions...

Breed of MBR Infecting Ransomware – an analysis by Quick Heal Security Labs

 May 16, 2018

Estimated reading time: 6 minutes

Ransomware is becoming one of the most perilous cyberattack methods and also the most habitual techniques for cybercriminals to earn money. It appears to have new weapons in its arsenal over time which is invariably aimed to boost its strength and enhance its business. As encrypting the files and restricting...