Blog

Cyber crime

Cyber Swachhta Kendra – A Digital India Initiative for a Secure Cyber Ecosystem

  • 115
    Shares
 March 6, 2017

Estimated reading time: 5 minutes

The Government of India recently launched an ambitious project called Cyber Swachhta Kendra (CSK) – a Botnet Cleaning and Malware Analysis Center. Developed under the Ministry of Electronics and Information Technology (MeitY), this center will be operated by the Indian Computer Emergency Response Team (CERT-In). Developed as an essential part...

5 Compelling Reasons Not to Pay Ransom to Hackers

  • 34
    Shares
 November 11, 2016
5-compelling-reasons-not-pay-ransomware-attack

Estimated reading time: 3 minutes

Unless you’ve been living under a rock, you would know what a ransomware is and why are computer security folks constantly speaking about it. To put things into context, ransomware is a malicious software that locks your computer or encrypts the files stored in it. It then demands a ransom...

Ransomware Getting Delivered Using Script Files

 August 16, 2016

Estimated reading time: 2 minutes

The ransomware threat has significantly grown over time. Each day, a new variant gets added to the ransomware family. Malware are usually delivered through exploit kits and spam emails. Speaking of spam emails, they are either loaded with malicious document files installing the malware or malware directly inside a ZIP...

7 Important Ransomware FAQs that you must know

  • 152
    Shares
 August 5, 2016

Estimated reading time: 3 minutes

There can be no two way to the fact that Ransomware has easily become one of the biggest banes of digital security for individual users and enterprises alike. Ransomware is a malware that locks an infected computer or encrypts its files (converts the files into an unreadable form). It then...

The Rio Olympics: Big Event. Bigger Stakes. Huge Online Scams

  • 29
    Shares
 July 12, 2016

Estimated reading time: 3 minutes

The month of August will witness some of the best performances by world class athletes in 2016 Rio Olympics. Considering the magnitude of the event, the online scammers have made best use of the platform to launch phishing attacks, lottery scams, counterfeit offers, merchandising schemes and more. As athletes prepare...

4 tips on how to protect yourself from ATM skimming

  • 134
    Shares
 June 27, 2016
ATM_Skimming

Estimated reading time: 2 minutes

It so happens that a vacation taken by a cyber security expert turns out to be yet another eye-opener for many. While holidaying in Vienna, Austria, cyber security expert Benjamin Tedesco comes across a well-camouflaged ATM skimming machine. Before we continue, let us tell you a little about what is...

Kovter: the fileless click fraud malware

 June 25, 2016

Estimated reading time: 1 minute

Kovter Trojan has been in effect since 2013. Being fileless, Kovter is different and stealthier than other Trojan families. It employs various anti-debugging, anti-VM, anti-sandboxing techniques, and has checks for identification of different security analysis tools. It uses different encryption techniques for different purposes. Like other Trojans, Kovter gathers user...

Cyber Security Challenges and Emerging Reforms in the Indian Banking Sector

  • 44
    Shares
 June 1, 2016

Estimated reading time: 3 minutes

The Indian banking industry has evolved majorly in the past few years owing to technological innovations. Public and privatized banks are allotting bigger budgets towards acquiring and building IT infrastructure and have leveraged IT across all banking operations. Banks constantly face the business challenge of meeting customers’ expectations and improvising...

Compromised WordPress websites redirect users to malicious domains

 March 9, 2016

Estimated reading time: 3 minutes

Of late, popular content management system (CMS) WordPress has been in the news for being targeted by hackers. Several websites built on WordPress are facing the brunt due to unpatched vulnerabilities and default configuration issues. Below are some attacks which were perpetrated using compromised WordPress websites: Backdoors (means to access...

Quick Heal Labs Report on Targeted Attack named ‘m_project’

 March 7, 2016

Estimated reading time: 4 minutes

At Quick Heal Labs, we are tracking a targeted attack dubbed as ‘m_project’. Initially, attackers used malicious Microsoft Excel documents to infiltrate the targeted system. Presently, attackers are also using malicious Microsoft Office RTF files which exploit a security vulnerability which is very popular among hackers; it is called ‘CVE...