Phishing

The evolution of a 4-year-old-threat Emotet: From an infamous Trojan to a complex threat distributer

Emotet malware campaign has been existing for a long time. It comes frequently in intervals with different techniques…

What is the price of your stolen identity on the online black market?

If you thought there is only a black market for stolen mobile phones, drugs, pirated software, etc., then…

3 common types of phishing attacks and tips to avoid them

Phishing is one of the oldest tricks in the book of hackers. But as old as it might…

Can you spot a phishing email? Take this test and find out!

One of the oldest, nastiest and most lucrative tools used by hackers is phishing – a method to…

An in-depth analysis of a new, emerging “.url” malware campaign – by Quick Heal Security Labs

Last week, we had blogged about the emergence of a new attack vector ‘.url’ which is used to…

The A-Z dictionary of cybersecurity terms

Whether you are a normal user or a tech-guru, being aware of the computer security threats will help…

A free guide to 7 computer viruses you should know about

Computer viruses are nasty little programs that are designed to lay waste to your computer. Some destroy files…

7_computer_viruses_you_should_know_about

A massive security flaw discovered in Skype. Fix not coming anytime soon.

Quick Heal Security Labs has recently learned about a serious vulnerability in Skype’s update installer – that’s the…

WhatsApp Scam Alert! Do not be fooled by this new scam

This is a quick advisory to warn our readers about a new WhatsApp scam that is afoot. In…

WhatsApp_Scam_Alert

On Data Privacy Day, here are 10 simple tips to keep your data safe

Recognized annually on January 28th, Data Privacy Day is defined as a centered approach towards respecting privacy, safeguarding…