Blog

Phishing

5 ways to instantly detect a phishing email and save yourself from phishing attack

Estimated reading time: 2 minutes

Phishing is a fraudulent activity to trick you into revealing your personal and confidential information. This information usually includes bank account details, net banking details, credit/debit card numbers, login ID and passwords. Every day, countless people become unsuspecting victims of phishing attacks. With cyber criminals adopting sophisticated modes of phishing...

Essential cyber safety tips every woman should follow

  • 139
    Shares
 March 8, 2019

Estimated reading time: 3 minutes

There is less doubt that women are more social, expressive and vocal as compared to men and what better means to enjoy such freedom of expression than social media. Reports suggest that over 76% of social media users are women; either looking to make connections, initiate discussions on women-specific topics...

This Valentine fall for true love not for fake online dating apps

 February 14, 2019

Estimated reading time: 2 minutes

Valentine Day is that special time of the year when people are busy celebrating the essence of love. However, on the darker side, it is also a time when cyber criminals are looking to cash on your hunt for the love of your life. So, just in case you are...

Anatova, A modular ransomware

  • 20
    Shares
 January 29, 2019

Estimated reading time: 6 minutes

While everyone was engaged in new year celebrations, malware authors were busy creating new ransomware for 2019. Quick Heal Security Labs has observed the first ransomware of 2019 — Anatova. During our analysis, we found that Anatova is not just ransomware but a modular one. By modular ransomware we mean,...

Malspam email – Jack of all malware, master of none.

  • 30
    Shares
 January 21, 2019

Estimated reading time: 4 minutes

Malspam email or malicious spam emails are considered to be one of the favorite malware delivery channels for the attackers to deliver the malware to targeted victims. Attackers also run spam email campaigns to distribute their malware to a large number of users. For attackers to succeed, two things are...

Beware! Your website might be delivering Emotet malware

  • 17
    Shares
 December 29, 2018

Estimated reading time: 11 minutes

In 2018, we saw a surge in Emotet activity. Emotet started as a banking trojan but this blog will shed light on how it has also become a “threat distributor”. We will also discuss server-side and client-side activity and how it spreads. Its self-propagation makes it all the more challenging...

Sophisticated Ransomware : “Katyusha”

  • 16
    Shares
 December 14, 2018

Estimated reading time: 6 minutes

For several months, Quick Heal Security Labs has been observing an increase in ransomware, we have found one more interesting ransomware which encrypts files and adds extension “.katyusha” and demands for an amount of 0.5 btc within three days and threatens to release the data to public download if the ransom is not...

Obfuscated Equation Editor Exploit (CVE-2017-11882) spreading Hawkeye Keylogger

  • 15
    Shares
 November 1, 2018

Estimated reading time: 6 minutes

Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft’s equation editor exploit to spread Hawkeye keylogger. Cybercriminals use different techniques to steal confidential data. Now they are offering...

How to differentiate between spam and phishing emails?

  • 1
    Share
 October 11, 2018

Estimated reading time: 3 minutes

Emails today have become an integral part of our day-to-day life and this has made it a child’s play for spammers to lure people into opening fraudulent emails and attachments. Thus, while you are using emails for your everyday personal or official use, it is important to realize that the...

How can my Facebook account be misused if hacked?

  • 11
    Shares
 October 4, 2018

Estimated reading time: 2 minutes

At a time when most of us are living in a virtual world, where we are connected to our friends and family mostly through social networking sites, imagine what it would be like to find your social media account hacked!! That’s exactly what happened with 50 million of Facebook users...