Blog

Privacy

Are you being tracked by websites you visit?

 July 17, 2020

Estimated reading time: 2 minutes

You’re bored during the lockdown. To pass the time, you create an imaginary itinerary to Italy. After a couple of hours of merrily choosing the best places in Rome and Milan to see, you turn off the website and go back to your work. But then, you notice something strange....

Data Breach – Understanding the severity of it

 July 15, 2020

Estimated reading time: 2 minutes

A data breach is a security gap in which information or data is accessed or stolen without authorization. It is a breach of trust between the owner of the data and the party that accesses it without consent. To put it in simpler terms it a nonconsensual usage of someone’s...

BHIM App attacked! Secure your online banking today with Quick Heal

 June 25, 2020

Estimated reading time: 2 minutes

India’s BHIM (Bharat Interface for Money) app used for mobile payments was reported recently to have suffered a massive data leakage of 7.26 million records, according to a security research company. According to the report, the leak happened due to a flaw in a website linked to the BHIM app...

Way Out of The MAZE: A Quick Guide For Defending Against Maze Ransomware

 April 23, 2020
The modus operandi of the Maze Ransomware

Estimated reading time: 6 minutes

From late 2019, MAZE Ransomware started becoming infamous for its Encryption, data stealing and the subsequent selling of the stolen data. Few other reasons behind its popularity are also its unique targets and the ransom demands. From its inception around May 2019, MAZE actors are targeting multiple sectors, prominent ones...

HorseDeal Riding on The Curveball!

 February 5, 2020

Estimated reading time: 5 minutes

It’s surprising to see how quickly attackers make use of new vulnerabilities in malware campaigns. Microsoft recently patched a very interesting vulnerability in their monthly Patch Tuesday update for January 2020. It’s a spoofing vulnerability in Windows CryptoAPI (Crypt32.dll) validation mechanism for Elliptic Curve Cryptography (ECC) certificates. An attacker could...

A sloppy click can exfiltrate your important data!

 February 3, 2020

Estimated reading time: 4 minutes

Phishing email still remains one of the top malware propagation medium. Recently, we came across an interesting phishing email containing couple of Jumpshare links pointing to malicious components. Jumpshare is an online file sharing service and often cyber criminals abuse these kind of file sharing services. Upon clicking on one of the links in...

What’s new in macOS Catalina ‘Security and Privacy’?

 November 1, 2019

Estimated reading time: 4 minutes

Apple released macOS 10.15 (Catalina) on 7th Oct 2019 and now it is publicly available for download. With multiple features presented at the WWDC 2019, here’s an overview of the new security and privacy features introduced in Catalina. Enhanced Gatekeeper Gatekeeper, is an important outer layer of security, designed to...

Webcam Hacking – How to prevent webcam from hacking into your privacy?

 July 19, 2019

Estimated reading time: 2 minutes

Imagine a day when you open your inbox and there’s this one mail containing obscene pics of you flashing on the screen. Right below is a message asking you to pay a hefty ransom to prevent your pics from getting shared with all your accounts. The thought itself is enough...

Beware! The padlock icon and HTTPS are no more indicators of safe website

 June 14, 2019

Estimated reading time: 2 minutes

The evolving cyber threat landscape has taken a new leap. The recent past shows a startling rise in the number of incidences of phishing attacks, where visitors have been lured into clicking fraudulent links, under the cover of security marks like padlock icon and ‘HTTPS’. Considering the rising number of...

What makes Quick Heal’s Next Generation Suite of Features a SMART choice to protect your privacy?

 May 29, 2019

Estimated reading time: 2 minutes

The cyber threat landscape is evolving every second, with thousands of new potential threats being detected every single day. With people becoming more and more conscious about their privacy and private data, such evolving threats can have a significant impact on the personal and financial life of people. In order...