Blog

Computer Security Terms

Data Breach – Understanding the severity of it

 July 15, 2020

Estimated reading time: 2 minutes

A data breach is a security gap in which information or data is accessed or stolen without authorization. It is a breach of trust between the owner of the data and the party that accesses it without consent. To put it in simpler terms it a nonconsensual usage of someone’s...

Ako Ransomware targeting businesses using RaaS

 January 24, 2020

Estimated reading time: 5 minutes

Ako Ransomware targeting businesses using RaaS Quick Heal security researchers recently observed ransomware that uses RaaS (Ransomware as a Service) which is a subpart of MaaS (Malware as a Service). Before delving into the AKO ransomware or RaaS, one must understand what Malware as a Service means, as it is...

Applying Deep Learning for PE-Malware Classification

  • 1
    Share
 January 10, 2019

Estimated reading time: 5 minutes

Deep Learning & Computer vision techniques are making progress in every possible field. With growing computing powers many organizations use them to resolve or minimize many day-to-day problems. In a recent talk at AVAR 2018, Quick Heal AI team presented an approach of effectively using Deep Learning for malware classification....

Emerging trend of spreading malware through IQY files

 October 3, 2018

Estimated reading time: 4 minutes

Nowadays attackers are searching for new techniques to spread malware, recently we came across a new emerging way to deliver malware through IQY file. Till now we had seen spread of malware through various file types and chains such as Word document, Script, JAVA files. Fig 1: Attack chain IQY file...

E-commerce transactions: Tips to stay safe when shopping online

 September 25, 2018
e-commerce-tips

Estimated reading time: 2 minutes

Today’s new-generation customer has all the luxuries. At the click of a button (or a touch, on a mobile phone), they can buy literally anything they want. The arrival of online marketplaces like Flipkart, Amazon and thousands of other similar websites means that the basic premise of going out of...

A massive security flaw discovered in Skype. Fix not coming anytime soon.

  • 18
    Shares
 February 14, 2018

Estimated reading time: 2 minutes

Quick Heal Security Labs has recently learned about a serious vulnerability in Skype’s update installer – that’s the bad news. The worse news is, Microsoft is not going to patch the vulnerability anytime soon as this would require the updater to go through a ‘large code revision’. What is this...

Machine learning approach for advanced threat hunting

  • 199
    Shares
 February 2, 2018

Estimated reading time: 6 minutes

In today’s fast-changing world, the cyber threat landscape is getting increasingly complex and signature-based systems are falling behind to protect endpoints. All major security solutions are built with layered security models to protect endpoints from today’s advanced threats. Machine learning-based detection is also becoming an inevitable component of these layered...

Third-Party Apps becomes significant source of Malware Attacks on Android Smartphones

  • 65
    Shares
 July 22, 2016

Estimated reading time: 3 minutes

We love options! But smart people also love the authenticity of the options available. Most of us rely on Google Play Store or Windows Store to download our favorite apps because they are the official pre-installed app for Android and Windows devices and hence, a trusted source. Google Play or...

The Rio Olympics: Big Event. Bigger Stakes. Huge Online Scams

  • 29
    Shares
 July 12, 2016

Estimated reading time: 3 minutes

The month of August will witness some of the best performances by world class athletes in 2016 Rio Olympics. Considering the magnitude of the event, the online scammers have made best use of the platform to launch phishing attacks, lottery scams, counterfeit offers, merchandising schemes and more. As athletes prepare...