Blog

Spyware

Pegasus like spyware could be snooping on you right now!!

Estimated reading time: 4 minutes

The recent news of Pegasus spyware attack via WhatsApp that targeted lawyers, journalists and human rights activists, offers an astonishing revelation on the kind of havoc such spyware can create. We covered the topic extensively, recently. The frequent media buzz about the recent incident of snooping by Pegasus spyware which...

Evolution of jRAT JAVA Malware – An analysis by Quick Heal Security Labs

 October 3, 2017

Estimated reading time: 4 minutes

jRAT (Java Based Remote Access Trojans) malware is not new but its activity has increased recently in the last few months and they are targeting various organizations. Per day, Quick Heal Security Labs identifies thousands of spam emails carrying weaponized JAR as attachments targeting users. These malicious JAR i.e., jRAT...

Quick Heal Security Predictions for 2016: Be Alert, Be Secured and Stay Safe!

 December 24, 2015

Estimated reading time: 3 minutes

It is time to say goodbye to 2015 and welcome 2016. New Year wishes, greetings and celebrations are on its way. And, so are New Year resolutions and predictions. Quick Heal family wishes you a Merry Christmas and a safe and secured New Year 2016. 2015 was an eventful year...

Security Vulnerabilities for Android and iOS Hit An All-time High in 2015

  • 1
    Share
 December 4, 2015

Estimated reading time: 4 minutes

Quick Heal hopes it has been a good year for you. But, has it been a good year for your mobile devices as well? It has been an alarming year for both Android and iOS users. If Android users were vulnerable to Stagefright attacks, iOS users had their own share...

Beware of the Hidden Threats of Corrupted Software Files!

 October 1, 2015

Estimated reading time: 3 minutes

From a minimal calendar app, to a jazzy media player or a popular PC game, we all love downloading freebies from the Internet. And this common interest of ours is just well too known by attackers. Downloadable files on the Internet are one of the most common mediums used by...

Are you ready for the Quick Heal Crossword Contest?

 July 31, 2015

Estimated reading time: 1 minute

For all our avid blog readers, we are bringing in the Quick Heal crossword contest that would be conducted every month on our blog. The crossword will be based on some common computer security and technology terms. The first entry with the completed crossword will be the winner of a...

Stegosploit – A Technique that can Hack your PC Using Just an Image!

  • 2
    Shares
 June 3, 2015

Estimated reading time: 2 minutes

By merely looking at an image in your browser, you can infect your PC with a malware. Know how from the following post. Thanks to a technique called Stegosploit, a hacker can infect your system by simply making you load an image on the Internet. You don’t even have to...

Online Banking Users, Beware of the Cridex Worm!

  • 1
    Share
 February 18, 2015

Estimated reading time: 2 minutes

There is a computer worm on the loose that steals personal login ID and passwords. This worm is known to target users of online banking and social media sites like Facebook, Twitter, etc. Scroll down to know more about this worm and how you can stay safe against it. The...

Malware Alert! Android Virus Steals Personal Data including Passwords

  • 3
    Shares
 December 10, 2014

Estimated reading time: 2 minutes

Computer Emergency Response Team of India (CERT-In) has issued an advisory, warning users against a new Android virus that is out on the streets. Named as Android/SmsSend, this virus affects Android smartphones and steals personal information including sensitive data such as passwords. Scroll further to read more about this mobile...