Blog

Security

Machine learning approach for advanced threat hunting

  • 199
    Shares
 February 2, 2018

Estimated reading time: 6 minutes

In today’s fast-changing world, the cyber threat landscape is getting increasingly complex and signature-based systems are falling behind to protect endpoints. All major security solutions are built with layered security models to protect endpoints from today’s advanced threats. Machine learning-based detection is also becoming an inevitable component of these layered...

How Web Filtering secures your digital world

  • 47
    Shares
 February 2, 2018
Web_filtering_Quick_Heal

Estimated reading time: 4 minutes

What is web filtering? Web filtering, also known as content filtering and URL filtering, restricts access to certain websites which may be harmful if opened or accessed. This feature not only helps protect a user’s device but also helps implement certain policies for an organization. Web filtering works on two...

In-browser Cryptojacking at full throttle – A report by Quick Heal Security Labs

  • 27
    Shares
 January 23, 2018

Estimated reading time: 4 minutes

Cryptocurrencies like Bitcoin, Monero, Ethereum, Litecoin, and Tezos are in full swing. And they have exponentially increased cryptocurrency mining (or cryptomining) activities. Previously, cryptomining was carried out by powerful and dedicated mining hardware or by utilizing distributed computing because the entire process requires a lot of computation. However, there has been an observable change in the mining trends. Now, web browsers are taking part in cryptomining and its activity is growing because...

Here’s how you can stay safe from the Android Banking Trojan that targets banking apps

  • 2
    Shares
 January 10, 2018

Estimated reading time: 2 minutes

If our readers can recollect, Quick Heal Security Labs had released an important advisory about an Android banking Trojan that is known to target about 232 banking apps. As a continuation of the post, here we will help you understand how you can protect yourself from this malware by following...

What do we need to know about the CPU vulnerabilities Meltdown and Spectre?

  • 5
    Shares
 January 4, 2018

Estimated reading time: 2 minutes

What exactly is a vulnerability? A security vulnerability (also known as a security hole) is a security flaw detected in a product that may leave it open to hackers and malware. Using such vulnerabilities, attackers can exploit the affected system/product for their profit in various ways. What is an exploit? Exploits...

Quick Heal Total Security receives BEST+++ certification from AVLab in Fileless Malware Protection Test

 December 7, 2017

Estimated reading time: 2 minutes

AVLab is an independent organization that conducts tests on security software for corporate networks and individual user devices. These tests are conducted by using malicious software, tools, and bypassing security techniques that are used in real cyberattacks. In October 2017, AVLab conducted a Fileless Malware Protection Test. In this test,...

Beware of fake social media messages that talk about SMS-based Aadhaar-LIC linking

  • 72
    Shares
 December 4, 2017

Estimated reading time: 2 minutes

You might be aware that LIC policyholders must now link their Aadhaar and PAN to their policies according to a directive issued by the Government of India. The deadline for the Aadhaar-LIC linking is December 31, 2017. And unsurprisingly, fraudsters have started misusing this news to their advantage. How? Read...

IcedID – a new sophisticated banking Trojan: a technical analysis by Quick Heal Security Labs

  • 2
    Shares
 November 29, 2017

Estimated reading time: 4 minutes

IcedID is a new player in the banking Trojan family. It has a modular architecture and capable of stealing banking credentials of the user by performing a man-in-the-middle attack (MITM). IcedID sets up a local proxy and redirects all Internet traffic through it. Additionally, it can download and execute components...

Beware! 12.5 million emails hiding a ransomware have been let loose by Necurs botnet

  • 69
    Shares
 November 28, 2017
Necurs Botnet

Estimated reading time: 2 minutes

If you weren’t careful with your incoming emails, then it’s time you should. Attackers have released 12.5 million emails hiding a ransomware called the Scarab malware. And Necurs botnet, the world’s largest email spam botnet, is being used in this attack. First, what is a botnet? A group of computers...

Imgur security breach: If you use Imgur, then change your password immediately!

  • 82
    Shares
 November 27, 2017

Estimated reading time: 2 minutes

Popular image-sharing site Imgur has issued a notification through its official blog about a security breach that impacted 1.7 million users. This breach had occurred back in 2014. The company learned about this from security researcher Troy Hunt. What was compromised in the Imgur security breach? Data of 1.7 million Imgur...