Blog

Hacker

Cryptocurrency miner hits IoT devices, mostly affects Brazil and Russia!

  • 7
    Shares
 August 9, 2018

Estimated reading time: 3 minutes

According to a blogpost published on Aug 1, 2018, 200,000 routers in Brazil were compromised to deliver Cryptocurrency mining scripts to mine Monero (XMR) cryptocurrency. Hackers compromised the vulnerable MikroTik routers by injecting CoinHive scripts into the routers web pages in order to carry out the mass Cryptocurrency miner attack....

Beware of the Armage Ransomware – the File Destroyer!

  • 12
    Shares
 August 8, 2018

Estimated reading time: 3 minutes

In July last week, Quick Heal Security Labs detected a new ransomware called Armage. It appends ‘.Armage’ extension to files it encrypts. Armage ransomware uses the AES-256 encryption algorithm to encode files making them inoperable. It spreads via spam emails and corrupted text files. Technical analysis Once executed on the...

What is the price of your stolen identity on the online black market?

  • 40
    Shares
 July 10, 2018

Estimated reading time: 2 minutes

If you thought there is only a black market for stolen mobile phones, drugs, pirated software, etc., then you could be wrong. There is a black market that exists on the Internet and its most lucrative commodity is your personally identifiable information (PII – sensitive information that can be used...

8 tips to avoid a spyware attack

  • 7
    Shares
 April 12, 2018

Estimated reading time: 2 minutes

Spyware refers to software that spy on your Internet browsing activities, record keystrokes, and collect almost any type of data including your personal information such as credit/debit card or banking details, login IDs and passwords. In this post, we share 8 tips to avoid a spyware attack and keep your...

Do not fall for the WhatsApp message about Jio Prime Offer. It’s a hoax!

  • 3
    Shares
 March 8, 2018

Estimated reading time: 3 minutes

A message about a Jio Prime offer is circulating among WhatsApp users. Do not fall for it because it’s a hoax. Last evening, I received this message from one of my contacts. Looks like a genuine message, doesn’t it? But, it is nothing but a hoax. How do we know?...

Chinese, Russian hackers counting on Apache Struts vulnerabilities – a report by Quick Heal Security Labs

 March 7, 2018

Estimated reading time: 4 minutes

Apache Struts is an open-source CMS based on MVC framework for developing Java EE Web Applications. Apache Struts has been widely used by many Fortune 100 companies and government agencies over the years for developing web applications. But, websites built using a CMS constantly need to upgrade the CMS versions in their web application servers, because vulnerabilities...

A massive security flaw discovered in Skype. Fix not coming anytime soon.

  • 18
    Shares
 February 14, 2018

Estimated reading time: 2 minutes

Quick Heal Security Labs has recently learned about a serious vulnerability in Skype’s update installer – that’s the bad news. The worse news is, Microsoft is not going to patch the vulnerability anytime soon as this would require the updater to go through a ‘large code revision’. What is this...

Scam Alert! Beware of online surveys promising free iPhone X

  • 3
    Shares
 January 16, 2018

Estimated reading time: 3 minutes

Ever came across an online survey that promised you a handsome prize? I did. And here’s what happened. While I was going about my daily work on the Internet, I came across the below page.   As you can see, I received a congratulatory message for being a loyal Google...

5 things you must know about the Uber data breach if you are worried about it

  • 49
    Shares
 November 23, 2017
Uber_data_breach

Estimated reading time: 3 minutes

For any business, suffering a data breach is bad. But, not informing its customers about the breach is downright worse. And Uber, a global transportation app company, has made itself into a glaring example of the above statement. Last Tuesday (21.11.2017), Uber Technologies revealed that hackers were able to compromise...

CVE-2017-11826 – Microsoft Office Memory Corruption Vulnerability – an Alert by Quick Heal Security Labs

 October 13, 2017

Estimated reading time: 2 minutes

The recent zero-day vulnerability in Microsoft Office vulnerability CVE-2017-11826 enables attackers to perform a Remote Code Execution on targeted machines. According to a recently published blog post, this vulnerability is being exploited in the wild. Microsoft has released a security update on October 10, 2017, to fix this issue. Vulnerable...