Blog
Quick heal blog

Quick Heal reports 29 malicious apps with 10 million+ downloads on Google Play Store

 September 24, 2019

Estimated reading time: 5 minutes

Quick Heal Security Labs reported 29 malicious apps found on Google Play Store, which have a collective download count of more than 10 Millions. Google was quick enough to remove these malicious apps from Play Store immediately. One of the Apps from this set, named “Multiapp multiple accounts simultaneously” has crossed 5 million...

Trivia! 5 things you never imagined could be hacked by cyber criminals

 September 13, 2019

Estimated reading time: 2 minutes

The term “hacking” has become the talk of the town, with one new incidence of hacking being reported every single day. The internet is in for a spin as cases of hacking are getting reported on a global level, triggering the realization that anything and everything with a vulnerable spot...

The Free Mobile Anti-virus you are using can be a Fake!

 September 9, 2019

Estimated reading time: 4 minutes

Quick Heal Security Labs recently spotted multiple Fake Antivirus Apps on Google Play Store. What’s more alarming, is that one of these fake AV Apps has been downloaded 100000+ times already. These Apps appear to be genuine Anti-virus/virus-removal Apps with names like Virus Cleaner, Antivirus security, etc., but do not...

Teacher’s Day Special – Things that teachers must know about their students to make them cyber safe

 September 4, 2019

Estimated reading time: 2 minutes

A good teacher is not just someone who is good with academics. They are more of a role model and mentor, who can share the right knowledge with their students, to help them choose and perceive between the good and bad of the society they live in. Given the increasing...

PowerShell: Living off the land!

 August 30, 2019

Estimated reading time: 5 minutes

Trend of PowerShell based malware is increasing. General trend observed shows that malware authors use new techniques for infection and propagation of malwares along with open source tools. PowerShell gets executed with high privileges and that’s why it easily performs its activity and propagates through network. Quick Heal Security Lab...

Cybersquatting and Typosquatting victimizing innocent customers and brands

 August 28, 2019

Estimated reading time: 2 minutes

The rapid shift of brands towards online platforms and ecommerce portals, has opened the gates for cyber threats like Phishing, Cybersquatting and Typosquatting. In fact, every entity with an online presence today, feels burdened by the fear of compromising their brand reputation, in the face of these ubiquitous cyber threats....

Phishers using custom 404 Not Found error page to steal Microsoft credentials

 August 21, 2019

Estimated reading time: 2 minutes

In the latest of its kind phishing attacks, phishers have been found to use custom 404 Not Found error pages to run phishing campaign. This unusual phishing campaign is basically aimed at tricking unsuspecting victims into sharing their Microsoft login credentials. A 404 Not Found page is typically an indication...

Alert! 27 apps found on Google Play Store that prompt you to install Fake Google Play Store

 August 19, 2019

Estimated reading time: 5 minutes

Quick Heal Security Lab spotted 27 malicious apps of dropper category on official “Google Play Store”. These apps have been removed from Play Store after Quick Heal Security Lab reported it to Google last week. These apps continuously show installation prompt for fake “Google Play Store”. If any user falls...

Alert! Income tax refund SMS – Newest way of conducting bank fraud by cyber criminals

 August 9, 2019

Estimated reading time: 2 minutes

Scammers are literally on their toes all year round, but for all the wrong reasons, devising ways and means to trick innocent people. In their latest attempt at fraud, cyber criminals are using fake SMS pretending to be from Income Tax Department to trick innocent victims into sharing bank account...

Android based IoT devices with open ADB port inviting easy attacks by Crypto-miners

 August 7, 2019

Estimated reading time: 2 minutes

The rapid pace at which connected smart home devices are increasing, have opened the gates for a new era of cyber-attacks on IoT devices including smart phones, TVs, IP cameras, etc. These attacks are mostly in the form of crypto mining attacks wherein cryptocurrency-mining botnet enters the targeted device via...