Blog

Hacktivism

Trivia! 5 things you never imagined could be hacked by cyber criminals

 September 13, 2019

Estimated reading time: 2 minutes

The term “hacking” has become the talk of the town, with one new incidence of hacking being reported every single day. The internet is in for a spin as cases of hacking are getting reported on a global level, triggering the realization that anything and everything with a vulnerable spot...

Cybersquatting and Typosquatting victimizing innocent customers and brands

 August 28, 2019

Estimated reading time: 2 minutes

The rapid shift of brands towards online platforms and ecommerce portals, has opened the gates for cyber threats like Phishing, Cybersquatting and Typosquatting. In fact, every entity with an online presence today, feels burdened by the fear of compromising their brand reputation, in the face of these ubiquitous cyber threats....

You’ve Been Hit By Ransomware. Now What?

  • 24
    Shares
 October 9, 2018

Estimated reading time: 3 minutes

“ALL YOUR FILES HAVE BEEN ENCRYPTED”   You see that line flashing on your laptop or desktop and suddenly your adrenaline level shoots up with hundreds of questions already hitting your mind… How Do I Remove that Message? Why Can’t I Access My System? Will I Lose All My Work?...

“Troldesh’s” One More Variant in the Encryption Offender

  • 22
    Shares
 September 3, 2018

Estimated reading time: 4 minutes

Over the past few days, we have been observing criminals/hackers using a new carrier to deliver the ransomware malware. Recently, Quick Heal Security Labs observed a new variant of Troldesh ransomware which encrypts the data and adds the extension as “.no_more_ransom”. This ransomware comes under Crypto-Ransomware variant, the origin of this...

What is the price of your stolen identity on the online black market?

  • 53
    Shares
 July 10, 2018

Estimated reading time: 2 minutes

If you thought there is only a black market for stolen mobile phones, drugs, pirated software, etc., then you could be wrong. There is a black market that exists on the Internet and its most lucrative commodity is your personally identifiable information (PII – sensitive information that can be used...

A massive security flaw discovered in Skype. Fix not coming anytime soon.

  • 18
    Shares
 February 14, 2018

Estimated reading time: 2 minutes

Quick Heal Security Labs has recently learned about a serious vulnerability in Skype’s update installer – that’s the bad news. The worse news is, Microsoft is not going to patch the vulnerability anytime soon as this would require the updater to go through a ‘large code revision’. What is this...

Protecting your Enterprise IT Security against Physical Threats

 August 14, 2013

Estimated reading time: 3 minutes

Whenever we talk of IT security, the first thing people look for is a security software. But what about physical intrusion? What about the physical security of the digital assets? Are they being safeguarded? Let us look what measures you must take to physically secure your network and its components....

How Prepared is your Business against Data Breach?

 August 8, 2013

Estimated reading time: 3 minutes

Data breach remains one of the most critical threats for any business; large, small, and medium. This post takes you through a quick questionnaire which will help you understand how vulnerable your company is to data breach. What is Data Breach? When confidential data of an organization or an individual...

Work from Home Scam

 May 20, 2013

Estimated reading time: 2 minutes

Yet another kind of social media scam that has come under the radar of security officials is the “work from home scam”. This blog explains how such scams work, and how can you steer clear from them. Work from home scams are mostly linked to people who are unemployed and...