Blog

Computer Security Terms

Applying Deep Learning for PE-Malware Classification

  • 1
    Share
 January 10, 2019

Estimated reading time: 5 minutes

Deep Learning & Computer vision techniques are making progress in every possible field. With growing computing powers many organizations use them to resolve or minimize many day-to-day problems. In a recent talk at AVAR 2018, Quick Heal AI team presented an approach of effectively using Deep Learning for malware classification....

Emerging trend of spreading malware through IQY files

 October 3, 2018

Estimated reading time: 4 minutes

Nowadays attackers are searching for new techniques to spread malware, recently we came across a new emerging way to deliver malware through IQY file. Till now we had seen spread of malware through various file types and chains such as Word document, Script, JAVA files. Fig 1: Attack chain IQY file...

E-commerce transactions: Tips to stay safe when shopping online

 September 25, 2018
e-commerce-tips

Estimated reading time: 2 minutes

Today’s new-generation customer has all the luxuries. At the click of a button (or a touch, on a mobile phone), they can buy literally anything they want. The arrival of online marketplaces like Flipkart, Amazon and thousands of other similar websites means that the basic premise of going out of...

A massive security flaw discovered in Skype. Fix not coming anytime soon.

  • 18
    Shares
 February 14, 2018

Estimated reading time: 2 minutes

Quick Heal Security Labs has recently learned about a serious vulnerability in Skype’s update installer – that’s the bad news. The worse news is, Microsoft is not going to patch the vulnerability anytime soon as this would require the updater to go through a ‘large code revision’. What is this...

Machine learning approach for advanced threat hunting

  • 199
    Shares
 February 2, 2018

Estimated reading time: 6 minutes

In today’s fast-changing world, the cyber threat landscape is getting increasingly complex and signature-based systems are falling behind to protect endpoints. All major security solutions are built with layered security models to protect endpoints from today’s advanced threats. Machine learning-based detection is also becoming an inevitable component of these layered...

Third-Party Apps becomes significant source of Malware Attacks on Android Smartphones

  • 65
    Shares
 July 22, 2016

Estimated reading time: 3 minutes

We love options! But smart people also love the authenticity of the options available. Most of us rely on Google Play Store or Windows Store to download our favorite apps because they are the official pre-installed app for Android and Windows devices and hence, a trusted source. Google Play or...

The Rio Olympics: Big Event. Bigger Stakes. Huge Online Scams

  • 29
    Shares
 July 12, 2016

Estimated reading time: 3 minutes

The month of August will witness some of the best performances by world class athletes in 2016 Rio Olympics. Considering the magnitude of the event, the online scammers have made best use of the platform to launch phishing attacks, lottery scams, counterfeit offers, merchandising schemes and more. As athletes prepare...

Quick Heal: A “Make in India” Brand Recognized and Awarded at RSA 2016

  • 2
    Shares
 March 3, 2016

Estimated reading time: 2 minutes

We’re honored to announce that ICSA Labs has named Quick Heal a 2016 Excellence in Information Security Testing Award recipient. ICSA Labs recognized Quick Heal for successful completion of five years of continuous ICSA Labs information security testing. The Excellence in Information Security Testing (EIST) Award honors organizations that have continually tested...