Phishing

Obfuscated Equation Editor Exploit (CVE-2017-11882) spreading Hawkeye Keylogger

Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently…

How to differentiate between spam and phishing emails?

Emails today have become an integral part of our day-to-day life and this has made it a child’s…

How can my Facebook account be misused if hacked?

At a time when most of us are living in a virtual world, where we are connected to…

Emerging trend of spreading malware through IQY files

Nowadays attackers are searching for new techniques to spread malware, recently we came across a new emerging way…

Beware of the Armage Ransomware – the File Destroyer!

In July last week, Quick Heal Security Labs detected a new ransomware called Armage. It appends ‘.Armage’ extension…

Beware of the ‘Free Cycle Distribution Yojana’ WhatsApp message. It’s fake!

As India’s Independence Day (15th of August) approaches, messages about free distribution schemes are doing the rounds on…

The evolution of a 4-year-old-threat Emotet: From an infamous Trojan to a complex threat distributer

Emotet malware campaign has been existing for a long time. It comes frequently in intervals with different techniques…

What is the price of your stolen identity on the online black market?

If you thought there is only a black market for stolen mobile phones, drugs, pirated software, etc., then…

3 common types of phishing attacks and tips to avoid them

Phishing is one of the oldest tricks in the book of hackers. But as old as it might…

Can you spot a phishing email? Take this test and find out!

One of the oldest, nastiest and most lucrative tools used by hackers is phishing – a method to…