Kovter: the fileless click fraud malware

 June 25, 2016

Estimated reading time: 1 minute

Kovter Trojan has been in effect since 2013. Being fileless, Kovter is different and stealthier than other Trojan families. It employs various anti-debugging, anti-VM, anti-sandboxing techniques, and has checks for identification of different security analysis tools. It uses different encryption techniques for different purposes. Like other Trojans, Kovter gathers user...

What is Malvertising and How to Stay Away from it?

  • 52
 June 21, 2016

Estimated reading time: 3 minutes

If anything, cybercriminals are an ambitious lot. They keep themselves busy in devising new methods to scam the Internet population. And malvertising is just one of their nefarious tricks. In this post, we will help you understand what is malvertising, how it works, and how you can protect yourself from...

How Point of Sale (PoS) Malware Steals Credit Card Data

 July 17, 2015

Estimated reading time: 3 minutes

The Quick Heal Quarterly Threat Report for the second quarter of 2015 indicated a massive rise in the number of malware samples that afflicted the Windows platform across the world. This trend can be attributed to the fact that malware authors have started propagating their malicious software variants to all...

Malicious Ebola Emails, Malvertising and other IT Security News

 October 27, 2014

Estimated reading time: 2 minutes

As the last week of October kicks in, we have for you some important IT security news, updates and alerts. Read on and share the same among your friends and family. Hackers Using Ebola Outbreak to Attack Users Malicious emails that seem to come from the World Health Organization (WHO)...