Blog

Phishing

Cybersquatting and Typosquatting victimizing innocent customers and brands

 August 28, 2019

Estimated reading time: 2 minutes

The rapid shift of brands towards online platforms and ecommerce portals, has opened the gates for cyber threats like Phishing, Cybersquatting and Typosquatting. In fact, every entity with an online presence today, feels burdened by the fear of compromising their brand reputation, in the face of these ubiquitous cyber threats....

Phishers using custom 404 Not Found error page to steal Microsoft credentials

 August 21, 2019

Estimated reading time: 2 minutes

In the latest of its kind phishing attacks, phishers have been found to use custom 404 Not Found error pages to run phishing campaign. This unusual phishing campaign is basically aimed at tricking unsuspecting victims into sharing their Microsoft login credentials. A 404 Not Found page is typically an indication...

Beware! Email attachments can make you victim of spear phishing attacks

 June 21, 2019

Estimated reading time: 4 minutes

In the last few months, we’ve seen a sudden increase in Spear Phishing attacks. Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. In this type of attack, the attacker uses social engineering tricks and some...

Beware! The padlock icon and HTTPS are no more indicators of safe website

 June 14, 2019

Estimated reading time: 2 minutes

The evolving cyber threat landscape has taken a new leap. The recent past shows a startling rise in the number of incidences of phishing attacks, where visitors have been lured into clicking fraudulent links, under the cover of security marks like padlock icon and ‘HTTPS’. Considering the rising number of...

5 ways to instantly detect a phishing email and save yourself from phishing attack

 April 18, 2019

Estimated reading time: 2 minutes

Phishing is a fraudulent activity to trick you into revealing your personal and confidential information. This information usually includes bank account details, net banking details, credit/debit card numbers, login ID and passwords. Every day, countless people become unsuspecting victims of phishing attacks. With cyber criminals adopting sophisticated modes of phishing...

Essential cyber safety tips every woman should follow

  • 139
    Shares
 March 8, 2019

Estimated reading time: 3 minutes

There is less doubt that women are more social, expressive and vocal as compared to men and what better means to enjoy such freedom of expression than social media. Reports suggest that over 76% of social media users are women; either looking to make connections, initiate discussions on women-specific topics...

This Valentine fall for true love not for fake online dating apps

 February 14, 2019

Estimated reading time: 2 minutes

Valentine Day is that special time of the year when people are busy celebrating the essence of love. However, on the darker side, it is also a time when cyber criminals are looking to cash on your hunt for the love of your life. So, just in case you are...

Anatova, A modular ransomware

  • 20
    Shares
 January 29, 2019

Estimated reading time: 6 minutes

While everyone was engaged in new year celebrations, malware authors were busy creating new ransomware for 2019. Quick Heal Security Labs has observed the first ransomware of 2019 — Anatova. During our analysis, we found that Anatova is not just ransomware but a modular one. By modular ransomware we mean,...