Blog

Botnet

An in-depth analysis of a new, emerging “.url” malware campaign – by Quick Heal Security Labs

  • 2
    Shares
 March 19, 2018

Estimated reading time: 5 minutes

Last week, we had blogged about the emergence of a new attack vector ‘.url’ which is used to spread malware. In this blog post, we will deep-dive into the attack chain of this ‘.url’ vector and elaborate on the Quant Loader malware which is actively making use of it. Let’s...

Latest IT Security News and Updates for the Week

 March 8, 2014

Estimated reading time: 2 minutes

There are several interesting new developments in the security world, and here are some of the news stories from the week gone by that you should be looking at. Facebook Whatsapp deal for $19 billion still not completed due to privacy concerns If you have doubts about your private data...

Alert: Ransomware are on the loose. Know what precautions you should take to prevent data loss

  • 10
    Shares
 October 22, 2013

Estimated reading time: 4 minutes

A few weeks back we had informed our readers about CryptoLocker – a new type of a ransomware that has been let loose on the Internet. This post discusses some more important facts about this malware, and steps you must take to prevent it from affecting your computer. What is...

Massive Android botnet invades China: Could India be the next target?

  • 1
    Share
 January 21, 2013

Estimated reading time: 3 minutes

A massive Trojan botnet has been discovered in Android devices in China and this serves as a timely reminder of the growing vulnerability of the Android platform. Staggeringly, this botnet has infected more than 1 million Android devices that function in China. The high vulnerability of Android devices in China...

The persistent threat of PC malware: Top Windows malware families of 2012

 January 9, 2013

Estimated reading time: 4 minutes

2012 has seen various malware threats and international cyberespionage tools evolve to new heights. However, the PC still remains the most accessible device for invading homes and planting malware. The number and nature of malware received by the Quick Heal Research & Development Labs in 2012 highlighted this fact. The...

The growing threat of mobile malware: Top Android malware families of 2012

 January 8, 2013

Estimated reading time: 3 minutes

The open-source nature of the Android platform is its biggest strength and Achilles heel at the same time. Android handsets constituted almost 72% of global smartphone sales in Q3 2012 and 1.3 million Android devices are activated worldwide every single day. This is a staggering market share that Android enjoys...

Future Watch VII: Your Smart TV opens up a new frontier for hacks and spying

 December 17, 2012

Estimated reading time: 3 minutes

Just like smartphones arrived in most markets and obliterated regular feature phones, smart TV’s are expected to change the way we interact with our television sets. A smart TV, or hybrid TV, comes integrated with several web 2.0 applications and widgets that allow users to access the Internet and obtain...

Security news updates from the week gone by

 December 15, 2012

Estimated reading time: 2 minutes

Bangalore biggest target of cyber crimes in 2012 The cyber criminal cell at the Criminal Investigation Department (CID) has reported that out of all Indian cities, Bangalore faced the most number of cyber crimes in 2012. Close to 400 reported incidents have been witnessed till the end of November in...

Vulnerable Wi-Fi routers lead to attacks and fake websites

 October 19, 2012

Estimated reading time: 2 minutes

It was recently discovered that millions of ADSL routers were hacked in Brazil to create a large botnet chain. This is an unprecedented move that goes to show that not even our routers are safe from attackers. Many homes and offices use Wi-Fi routers for web access today so it...

New ransomware spreads through malicious links in Skype IMs

 October 11, 2012

Estimated reading time: 2 minutes

A new malicious worm that spreads through Instant Messages (IMs) over Skype has been discovered. This worm manifests itself as yet another variation of ransomware and also unloads itself to generate a click fraud from the users’ machine. The worm is a strain of the Dorkbot virus and it utilizes...