Security

Anydesk Software Exploited to Spread Babuk Ransomware

We generally see that ransomware attacks are deployed through exploits, unsolicited malicious emails (malspam), or malicious Microsoft Office…

Zloader: Entailing Different Office Files

Zloader aka Terdot – a variant of the infamous Zeus banking malware is well known for aggressively using…

This festive season gift your loved ones ‘online security’

Phew, an unprecedented year finally seems to be coming to an end. To put it mildly, it’s been…

Take your browser security to the next level!

  Today, almost every computer user leverages a variety of web browsers to surf the internet — Microsoft…

Why secure your IoT Devices?

Introduction to IoT This blog describes one of the current disruptive technologies in the market, i.e. IoT (Internet…

Why secure your IoT Devices

HorseDeal Riding on The Curveball!

It’s surprising to see how quickly attackers make use of new vulnerabilities in malware campaigns. Microsoft recently patched…

A sloppy click can exfiltrate your important data!

Phishing email still remains one of the top malware propagation medium. Recently, we came across an interesting phishing email…

Ako Ransomware targeting businesses using RaaS

Ako Ransomware targeting businesses using RaaS Quick Heal security researchers recently observed ransomware that uses RaaS (Ransomware as…

What’s new in macOS Catalina ‘Security and Privacy’?

Apple released macOS 10.15 (Catalina) on 7th Oct 2019 and now it is publicly available for download. With…

The Free Mobile Anti-virus you are using can be a Fake!

Quick Heal Security Labs recently spotted multiple Fake Antivirus Apps on Google Play Store. What’s more alarming, is…