Blog

Spyware

Scam Alert! Beware of online surveys promising free iPhone X

  • 34
    Shares
 January 16, 2018

Estimated reading time: 3 minutes

Ever came across an online survey that promised you a handsome prize? I did. And here’s what happened. While I was going about my daily work on the Internet, I came across the below page.   As you can see, I received a congratulatory message for being a loyal Google...

Evolution of jRAT JAVA Malware – An analysis by Quick Heal Security Labs

 October 3, 2017

Estimated reading time: 4 minutes

jRAT (Java Based Remote Access Trojans) malware is not new but its activity has increased recently in the last few months and they are targeting various organizations. Per day, Quick Heal Security Labs identifies thousands of spam emails carrying weaponized JAR as attachments targeting users. These malicious JAR i.e., jRAT...

Quick Heal Security Predictions for 2016: Be Alert, Be Secured and Stay Safe!

 December 24, 2015

Estimated reading time: 3 minutes

It is time to say goodbye to 2015 and welcome 2016. New Year wishes, greetings and celebrations are on its way. And, so are New Year resolutions and predictions. Quick Heal family wishes you a Merry Christmas and a safe and secured New Year 2016. 2015 was an eventful year...

Security Vulnerabilities for Android and iOS Hit An All-time High in 2015

  • 1
    Share
 December 4, 2015

Estimated reading time: 4 minutes

Quick Heal hopes it has been a good year for you. But, has it been a good year for your mobile devices as well? It has been an alarming year for both Android and iOS users. If Android users were vulnerable to Stagefright attacks, iOS users had their own share...

Beware of the Hidden Threats of Corrupted Software Files!

 October 1, 2015

Estimated reading time: 3 minutes

From a minimal calendar app, to a jazzy media player or a popular PC game, we all love downloading freebies from the Internet. And this common interest of ours is just well too known by attackers. Downloadable files on the Internet are one of the most common mediums used by...

Are you ready for the Quick Heal Crossword Contest?

 July 31, 2015

Estimated reading time: 1 minute

For all our avid blog readers, we are bringing in the Quick Heal crossword contest that would be conducted every month on our blog. The crossword will be based on some common computer security and technology terms. The first entry with the completed crossword will be the winner of a...

Stegosploit – A Technique that can Hack your PC Using Just an Image!

  • 2
    Shares
 June 3, 2015

Estimated reading time: 2 minutes

By merely looking at an image in your browser, you can infect your PC with a malware. Know how from the following post. Thanks to a technique called Stegosploit, a hacker can infect your system by simply making you load an image on the Internet. You don’t even have to...

Online Banking Users, Beware of the Cridex Worm!

  • 1
    Share
 February 18, 2015

Estimated reading time: 2 minutes

There is a computer worm on the loose that steals personal login ID and passwords. This worm is known to target users of online banking and social media sites like Facebook, Twitter, etc. Scroll down to know more about this worm and how you can stay safe against it. The...

Malware Alert! Android Virus Steals Personal Data including Passwords

  • 3
    Shares
 December 10, 2014

Estimated reading time: 2 minutes

Computer Emergency Response Team of India (CERT-In) has issued an advisory, warning users against a new Android virus that is out on the streets. Named as Android/SmsSend, this virus affects Android smartphones and steals personal information including sensitive data such as passwords. Scroll further to read more about this mobile...

Beware of World Cup 2014 Online Streaming Services

 June 30, 2014

Estimated reading time: 2 minutes

Early this month, we had warned our readers about various FIFA World Cup scams. And as the football fever is rising frantically, hackers are now using fake online streaming services as the ultimate bait to trick fans into installing adware, spyware, Trojans and other malware on their devices. While many...