Blog

Security

What is Quick Heal Total Security Multi-Device?

  • 3
    Shares
 August 18, 2017

Estimated reading time: 1 minute

If you are using a smartphone and a laptop, then it is most likely for at least one of your family members using a similar device or devices. Your parents, for instance, might be using a Windows desktop, your sibling a Mac and your kids an Android smartphone. In short,...

An analysis of TrickBot Malware by Quick Heal Security Labs

  • 30
    Shares
 August 4, 2017

Estimated reading time: 2 minutes

TrickBot has been a busy malware in the last month because of its various polymorphic propagation methods and techniques. We have seen collective versions and the same medium of propagation – the spam emails. These emails contain attachments to download or a direct link to spread the malicious payload. Trickbot...

An analysis of the Blank Slate Malspam Campaign by Quick Heal Security Labs

  • 19
    Shares
 August 3, 2017

Estimated reading time: 4 minutes

Malspam email or malicious spam email is considered as one of the favorite malware delivery channels for attackers to deliver their malware to their targeted victims. Attackers also run spam email campaigns to distribute their malware to a large number of users. For attackers to succeed, two things are important...

Beware of Fake Flash Player apps on Google Play

  • 45
    Shares
 August 2, 2017

Estimated reading time: 4 minutes

Quick Heal Security Labs has found 2 fraudulent apps pretending to be Adobe Flash Player on the Google Play Store. Presently, no official apps of Adobe Flash Player are available on the Play Store. The rest of the post will tell you more. Fake App #1. Plugin for Video Flash...

Cryptomix Ransomware resurfaces with multiple variants

  • 35
    Shares
 August 1, 2017

Estimated reading time: 3 minutes

Cryptomix Ransomware has been active for the last one year and has come up with multiple variants. It spreads via exploit kits, malicious attachments, and malicious links spread across the Internet on hacked domains. Cryptomix Ransomware does not change the desktop background but encrypts files stored on the infected system...

Malware alert! Beware of the BTCWare Aleta Ransomware

  • 5
    Shares
 July 25, 2017

Estimated reading time: 3 minutes

Quick Heal Security Labs has observed the entry of a new BTCWare ransomware (first observed at the beginning of 2017) variant called ‘Aleta’. This ransomware is called so because it appends a “.aleta” extension to files it encrypts in an infected computer. Although BTCWare ransomware variants do not seem to...

A technical analysis of the Java RAT (Remote Access Trojan) Malware

  • 42
    Shares
 July 17, 2017

Estimated reading time: 3 minutes

Remote Access Trojans are programs that allow attackers to gain unauthorized access to a targeted computer without the victim’s knowledge. Java RAT malware is a Trojan-Dropper written in Java. It is designed to steal passwords, access files, for keylogging (recording what the user types on the keyboard) and for screen-capture....

A technical analysis of the recent Petya ransomware attack

  • 6
    Shares
 June 30, 2017
Petya_ransomware_quick_heal

Estimated reading time: 4 minutes

Earlier this week, a new variant of Petya Ransomware was spotted which was creating havoc all over Europe as well as major parts of Asia including India. The major target for Petya has been Ukraine as its major banks and also the power services were hit by the attack. It’s...

DOs and DON’Ts to stay safe from Ransomware (infographic)

  • 1
    Share
 June 28, 2017

Estimated reading time: 1 minute

Unless you live in a cave, you would definitely know what is a ransomware. It is a malware that is keeping Internet users awake at nights and restless during the day. It does not strike with a warning, and when it does it does not leave without causing a catastrophe....

Quick Heal Total Security receives BEST+++ certification from AVLab

  • 108
    Shares
 June 26, 2017
Quick_Heal_Av_Lab_certificate

Estimated reading time: 1 minute

AVLab is an independent organization that conducts tests on security software for corporate networks and individual user devices. These tests are conducted by using malicious software, tools, and bypassing security techniques that are used in real cyberattacks. In April 2017, AVLab conducted a ‘Protection test against drive-by download attacks’. What...