Blog

Password

Sophisticated Ransomware : “Katyusha”

  • 16
    Shares
 December 14, 2018

Estimated reading time: 6 minutes

For several months, Quick Heal Security Labs has been observing an increase in ransomware, we have found one more interesting ransomware which encrypts files and adds extension “.katyusha” and demands for an amount of 0.5 btc within three days and threatens to release the data to public download if the ransom is not...

Have You Received A Call To Replace Your Stripe-Only Card With EMV Chip Card Yet?

  • 46
    Shares
 September 25, 2018

Estimated reading time: 2 minutes

In case you have received a reminder from your bank asking you to replace your stripe-only card with an EMV chip card and you have no idea why this change is being implemented, then you are at the right place. As per recent instructions received from the Reserve Bank of...

An analysis of the Dharma ransomware outbreak by Quick Heal Security Labs

  • 25
    Shares
 May 2, 2018

Estimated reading time: 7 minutes

On April 25, 2018, Quick Heal Security Labs issued an advisory on a new ransomware outbreak. We are observing a sudden spike of Dharma Ransomware. Even though Dharma ransomware is old, we observed its new variant which is encrypting files and appending the “.arrow” extension to it. Previously the encrypted...

The A-Z dictionary of cybersecurity terms

  • 1
    Share
 March 15, 2018

Estimated reading time: 8 minutes

Whether you are a normal user or a tech-guru, being aware of the computer security threats will help fortify your defense against them. So, here’s a handy A-Z dictionary of cybersecurity terms.

A massive security flaw discovered in Skype. Fix not coming anytime soon.

  • 18
    Shares
 February 14, 2018

Estimated reading time: 2 minutes

Quick Heal Security Labs has recently learned about a serious vulnerability in Skype’s update installer – that’s the bad news. The worse news is, Microsoft is not going to patch the vulnerability anytime soon as this would require the updater to go through a ‘large code revision’. What is this...

5 cybersecurity tips for safe online shopping this holiday season

  • 37
    Shares
 December 18, 2017

Estimated reading time: 3 minutes

By now, most of you must have started getting emails and messages about great deals and discounts from your online shopping websites. And while most of us get preoccupied with our shopping spree, cyber criminals will try to make the most of this opportunity. How? Well, that’s easy. They might...

Imgur security breach: If you use Imgur, then change your password immediately!

  • 82
    Shares
 November 27, 2017

Estimated reading time: 2 minutes

Popular image-sharing site Imgur has issued a notification through its official blog about a security breach that impacted 1.7 million users. This breach had occurred back in 2014. The company learned about this from security researcher Troy Hunt. What was compromised in the Imgur security breach? Data of 1.7 million Imgur...

5 common password mistakes and tips for creating stronger passwords

  • 87
    Shares
 November 10, 2017
Common Password Mistakes

Estimated reading time: 3 minutes

While technology has leaped from earth to the extraterrestrial, we have not given up on our habit of taking passwords casually. In this post, we have outlined some of the most common password mistakes that people make and some really simple tips for creating better, stronger, and secure passwords. 5...

31 tips on Internet Security you should totally follow [INFOGRAPHIC]

  • 70
    Shares
 October 4, 2017

Estimated reading time: 1 minute

October is observed as CyberSecurity Month which is an annual campaign organized to raise awareness about the importance of cybersecurity. Here’s an infographic that puts together 31 tips on Internet Security that will help you protect your digital devices, identity, and personal information from all types of threats on the...

AES-NI Ransomware adopts combination of Fileless and Code Injection technique

  • 29
    Shares
 June 22, 2017

Estimated reading time: 3 minutes

Cybercriminals are adopting unique ways for spreading malware and this has been evident in the cases of the Cerber ransomware where the RIG exploit was used and the WannaCry ransomware which used the SMBv1 vulnerability. And now it’s the AES-NI ransomware which uses a combination of fileless and code injection...