Blog

Phishing

What is the price of your stolen identity on the online black market?

  • 53
    Shares
 July 10, 2018

Estimated reading time: 2 minutes

If you thought there is only a black market for stolen mobile phones, drugs, pirated software, etc., then you could be wrong. There is a black market that exists on the Internet and its most lucrative commodity is your personally identifiable information (PII – sensitive information that can be used...

3 common types of phishing attacks and tips to avoid them

  • 131
    Shares
 June 26, 2018

Estimated reading time: 4 minutes

Phishing is one of the oldest tricks in the book of hackers. But as old as it might be, phishing still remains the most lucrative tool for cybercriminals; as they say, old is gold. This post tells you about the 3 common types of phishing attacks and tips to avoid...

Can you spot a phishing email? Take this test and find out!

  • 4
    Shares
 April 5, 2018

Estimated reading time: 3 minutes

One of the oldest, nastiest and most lucrative tools used by hackers is phishing – a method to fool you into revealing your personal and sensitive information such as debit/card numbers, passwords, ATM pin, date of birth – any data that can personal identify you. Here’s an example of a...

An in-depth analysis of a new, emerging “.url” malware campaign – by Quick Heal Security Labs

  • 2
    Shares
 March 19, 2018

Estimated reading time: 5 minutes

Last week, we had blogged about the emergence of a new attack vector ‘.url’ which is used to spread malware. In this blog post, we will deep-dive into the attack chain of this ‘.url’ vector and elaborate on the Quant Loader malware which is actively making use of it. Let’s...

The A-Z dictionary of cybersecurity terms

  • 1
    Share
 March 15, 2018

Estimated reading time: 8 minutes

Whether you are a normal user or a tech-guru, being aware of the computer security threats will help fortify your defense against them. So, here’s a handy A-Z dictionary of cybersecurity terms.

A free guide to 7 computer viruses you should know about

  • 36
    Shares
 March 13, 2018
7_computer_viruses_you_should_know_about

Estimated reading time: 4 minutes

Computer viruses are nasty little programs that are designed to lay waste to your computer. Some destroy files stored on your PC, while some trigger different software to malfunction. More nefarious viruses steal your confidential information and some even go to an extent to rig a system’s power load and...

A massive security flaw discovered in Skype. Fix not coming anytime soon.

  • 18
    Shares
 February 14, 2018

Estimated reading time: 2 minutes

Quick Heal Security Labs has recently learned about a serious vulnerability in Skype’s update installer – that’s the bad news. The worse news is, Microsoft is not going to patch the vulnerability anytime soon as this would require the updater to go through a ‘large code revision’. What is this...

WhatsApp Scam Alert! Do not be fooled by this new scam

  • 1
    Share
 January 31, 2018
WhatsApp_Scam_Alert

Estimated reading time: 1 minute

This is a quick advisory to warn our readers about a new WhatsApp scam that is afoot. In this scam, a fake message is getting circulated which informs a user that their WhatsApp subscription has expired and that they can buy a lifetime service just for 99p by clicking on...

On Data Privacy Day, here are 10 simple tips to keep your data safe

  • 231
    Shares
 January 25, 2018

Estimated reading time: 4 minutes

Recognized annually on January 28th, Data Privacy Day is defined as a centered approach towards respecting privacy, safeguarding data, and enabling trust. It is a global effort to raise and promote awareness around protecting one’s data and privacy. With this thought in mind, we have put together these 10 tips...

Quick Heal thwarts attempts of a JAVA jRAT phishing campaign targeting an international embassy in India

  • 35
    Shares
 January 16, 2018

Estimated reading time: 4 minutes

Earlier we had blogged about how JAVA based jRAT malware were evolved in the recent times. At Quick Heal Security Labs, we are actively observing jRAT campaigns happening in the wild. These JAVA malware spread through phishing campaigns. While analyzing one such phishing campaign, we found that an International embassy in India was being targeted by phishers. The malware used in the phishing campaign was the infamous JAVA malware called jRAT. ...