Blog

SSL certificate

HorseDeal Riding on The Curveball!

Estimated reading time: 5 minutes

It’s surprising to see how quickly attackers make use of new vulnerabilities in malware campaigns. Microsoft recently patched a very interesting vulnerability in their monthly Patch Tuesday update for January 2020. It’s a spoofing vulnerability in Windows CryptoAPI (Crypt32.dll) validation mechanism for Elliptic Curve Cryptography (ECC) certificates. An attacker could...

5 cybersecurity tips for safe online shopping this holiday season

  • 37
    Shares
 December 18, 2017

Estimated reading time: 3 minutes

By now, most of you must have started getting emails and messages about great deals and discounts from your online shopping websites. And while most of us get preoccupied with our shopping spree, cyber criminals will try to make the most of this opportunity. How? Well, that’s easy. They might...

Evolution of jRAT JAVA Malware – An analysis by Quick Heal Security Labs

 October 3, 2017

Estimated reading time: 4 minutes

jRAT (Java Based Remote Access Trojans) malware is not new but its activity has increased recently in the last few months and they are targeting various organizations. Per day, Quick Heal Security Labs identifies thousands of spam emails carrying weaponized JAR as attachments targeting users. These malicious JAR i.e., jRAT...

Pharming – What is it and How Can you Dodge it?

  • 30
    Shares
 May 17, 2017

Estimated reading time: 3 minutes

If someday you intend to go to a mall but end up in a fish market, then that’s a case of bad directional sense. In the digital world, however, we call it pharming! How Does Pharming Work? Phishing is an online fraud where a scammer sends fraudulent emails to the...

The Rio Olympics: Big Event. Bigger Stakes. Huge Online Scams

  • 29
    Shares
 July 12, 2016

Estimated reading time: 3 minutes

The month of August will witness some of the best performances by world class athletes in 2016 Rio Olympics. Considering the magnitude of the event, the online scammers have made best use of the platform to launch phishing attacks, lottery scams, counterfeit offers, merchandising schemes and more. As athletes prepare...

Superfish 2.0 – Dell Laptops Preinstalled with Similar Malware and Security Flaw

 November 26, 2015
Superfish 2.0 on Dell

Estimated reading time: 2 minutes

Earlier this year, several cases came to light where brand new Lenovo laptops came preinstalled with a strain of adware that was being used by hackers to steal sensitive data. This adware was known as ‘Superfish’ and it affected thousands of PC users around the world. The Superfish adware effectively...

Logjam Vulnerability: Why You Need to Upgrade Your Browsers

 May 21, 2015

Estimated reading time: 2 minutes

Another new SSL (Secure Sockets Layer) vulnerability has come to light in the last few hours and your home computers and office workstations could be at risk. If you are familiar with the Heartbleed and FREAK attacks from the last few months, then you would know that such kind of...

FREAK Attack – Android and Apple Browsers at Risk

 March 5, 2015

Estimated reading time: 3 minutes

A new Internet vulnerability is affecting popular SSL clients across the web. Eerily named FREAK, this flaw allows malicious parties and attackers to force servers to automatically downgrade to weakened ciphers. Once this is done, the attackers can easily crack all encrypted communications of these weakened servers through advanced Man-In-The-Middle...

Lenovo Users – This is how you can remove the Superfish Adware

 February 24, 2015

Estimated reading time: 3 minutes

In case you are unaware, Lenovo has been shipping some of its consumer notebooks with a  preinstalled adware called Superfish. This software makes it possible for hackers to steal sensitive user data like passwords, banking information, etc. Scroll down to know more about this adware and how to remove it...

50 Dos and Don’ts of Internet Security for the Year 2015!

  • 1
    Share
 December 29, 2014

Estimated reading time: 4 minutes

This post is to say thank you to all the fans and readers of Quick Heal blog with a recap of some of the most important dos and don’ts of Internet Security. Read on. The first official post on our blog was live on October 19th, 2006. And since then,...