Blog

Email

Pharming – What is it and How Can you Dodge it?

  • 30
    Shares
 May 17, 2017

Estimated reading time: 3 minutes

If someday you intend to go to a mall but end up in a fish market, then that’s a case of bad directional sense. In the digital world, however, we call it pharming! How Does Pharming Work? Phishing is an online fraud where a scammer sends fraudulent emails to the...

The Rio Olympics: Big Event. Bigger Stakes. Huge Online Scams

  • 29
    Shares
 July 12, 2016

Estimated reading time: 3 minutes

The month of August will witness some of the best performances by world class athletes in 2016 Rio Olympics. Considering the magnitude of the event, the online scammers have made best use of the platform to launch phishing attacks, lottery scams, counterfeit offers, merchandising schemes and more. As athletes prepare...

Phishing emails just got more dangerous! 93% of them contain ransomware

  • 65
    Shares
 June 13, 2016
Phishing emails contain ransomware

Estimated reading time: 2 minutes

If you thought phishing emails are less dangerous, then you would be terribly wrong. According to a recent report, almost 93% of phishing emails now carry the ransomware malware. First, what is phishing? Phishing is an age-old trick used by scammers and hackers to trick people into revealing their personal...

Malware Alert! Beware of Fake Emails with the subject line ‘Amazon Order Dispatched…’

  • 60
    Shares
 May 18, 2016

Estimated reading time: 2 minutes

After you are done shopping on any e-commerce website, receiving a confirmation email about your purchase is an expected thing. But, if you are receiving any such confirmation emails whose sender seems to be a popular online shopping portal and are mostly blank but contain attachment(s), then be cautious. Many...

Security Alert! Locky Ransomware on the loose

  • 110
    Shares
 April 11, 2016
locky_ransomware

Estimated reading time: 3 minutes

‘Locky’ is the latest addition to the ransomware family. It has an interesting name and carries the same nastiness. Read more from the post below. What is the Locky Ransomware? Locky is a new file-encrypting ransomware malware. It does two things: Encrypts the files it finds in the PC it...

Quick Heal Labs Report on Targeted Attack named ‘m_project’

 March 7, 2016

Estimated reading time: 4 minutes

At Quick Heal Labs, we are tracking a targeted attack dubbed as ‘m_project’. Initially, attackers used malicious Microsoft Excel documents to infiltrate the targeted system. Presently, attackers are also using malicious Microsoft Office RTF files which exploit a security vulnerability which is very popular among hackers; it is called ‘CVE...

8 Security Tips to Avoid Falling Prey to SIM Swap Frauds

  • 2
    Shares
 September 10, 2015

Estimated reading time: 3 minutes

With online banking gradually becoming a preferred choice of financial transaction for most, fraudsters have renewed their malicious efforts to target their victims. A relatively new type of fraud has come to light. It is known as SIM swap fraud. And we’re here to tell you how you can avoid...

Be Careful of these 5 Internet Scams Running on Facebook

  • 9
    Shares
 September 4, 2015

Estimated reading time: 4 minutes

As of last quarter, Facebook has over 1.19 billion monthly active users, with 728 million users using the service daily. On the dark side of the world, this figure amounts to the number of victims that online scammers have charted on their dartboards. Unarguably, Facebook is the most lucrative avenue...

Phishing Alert: Beware of Malicious Windows 10 Upgrade Emails

 August 5, 2015

Estimated reading time: 2 minutes

As has been reported in the past, malware authors and cyber criminals are very quick to mine trending topics over the Internet in order to trick people and infect their machines. Windows 10 has been making waves over the web off late with every Windows user curious to see what...

Stegosploit – A Technique that can Hack your PC Using Just an Image!

  • 2
    Shares
 June 3, 2015

Estimated reading time: 2 minutes

By merely looking at an image in your browser, you can infect your PC with a malware. Know how from the following post. Thanks to a technique called Stegosploit, a hacker can infect your system by simply making you load an image on the Internet. You don’t even have to...