Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently…
Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently…
Emails today have become an integral part of our day-to-day life and this has made it a child’s…
At a time when most of us are living in a virtual world, where we are connected to…
Nowadays attackers are searching for new techniques to spread malware, recently we came across a new emerging way…
In July last week, Quick Heal Security Labs detected a new ransomware called Armage. It appends ‘.Armage’ extension…
As India’s Independence Day (15th of August) approaches, messages about free distribution schemes are doing the rounds on…
Emotet malware campaign has been existing for a long time. It comes frequently in intervals with different techniques…
If you thought there is only a black market for stolen mobile phones, drugs, pirated software, etc., then…
Phishing is one of the oldest tricks in the book of hackers. But as old as it might…
One of the oldest, nastiest and most lucrative tools used by hackers is phishing – a method to…