Blog

Trojan

The persistent threat of PC malware: Top Windows malware families of 2012

 January 9, 2013

Estimated reading time: 4 minutes

2012 has seen various malware threats and international cyberespionage tools evolve to new heights. However, the PC still remains the most accessible device for invading homes and planting malware. The number and nature of malware received by the Quick Heal Research & Development Labs in 2012 highlighted this fact. The...

The growing threat of mobile malware: Top Android malware families of 2012

 January 8, 2013

Estimated reading time: 3 minutes

The open-source nature of the Android platform is its biggest strength and Achilles heel at the same time. Android handsets constituted almost 72% of global smartphone sales in Q3 2012 and 1.3 million Android devices are activated worldwide every single day. This is a staggering market share that Android enjoys...

‘Fake Payment Confirmation’ scam emails

  • 1
    Share
 October 31, 2012

Estimated reading time: 1 minute

A series of new spam emails that target computer users and attempt to infect them with a variant of a ZBOT trojan have been discovered. The e-mail attempts to persuade a recipient to open an attachment and claims that the said attachment contains a payment confirmation for the recipient. However,...

Beware of Fake Complaint Emails from BBB

 October 18, 2012

Estimated reading time: 1 minute

Another email scam that uses the name and logo of the Better Business Bureau (BBB) has continued to spread over the Internet. A majority of such emails carry the recognisable BBB torch logo and contain the subject line “Case #91492169”. These emails carry an attachment that contains a malicious executable file...

How to get your kids interested in cyber security?

 October 10, 2012

Estimated reading time: 2 minutes

Getting less tech-savvy family members, especially teenagers and younger children, interested in computer security is a thankless task. It is necessary to teach them the implications of security breaches along with the importance of preventive measures. Children and young adults are more vulnerable to security risks like viruses, phishing websites...

The different types of malware seen in the wild

 September 25, 2012

Estimated reading time: 3 minutes

We repeatedly speak about the different techniques that attackers use to infect machines with malware. We also provide precautions that users can take to protect themselves from malware and phishing threats. In this post we will highlight the different strains of malware that are seen in the wild and what...

Security news updates from the last week

 September 21, 2012

Estimated reading time: 1 minute

Microsoft releases ‘Fix it’ tool for IE vulnerability Microsoft has released a temporary “Fix it” tool for the highly publicized Internet Explorer vulnerability. A full IE update will soon be released as well. The security hole exploited Internet Explorer users when they visited a malicious website and installed a trojan...

Malware attack through Facebook photo tag notification

 July 24, 2012

Estimated reading time: 1 minute

This is a warning for Facebook users. A fraudulent email is circulating on the Internet claiming to be from Facebook and saying you’ve been tagged in a photo. The email probably looks like this: On a closer look the email is from “notification @faceboook.com” and not from a “Facebook.com” domain. This...

DNSChanger server shutdown deadline looming

 July 7, 2012

Estimated reading time: 1 minute

Quick Heal would like to remind its users about the impending DNSChanger server shutdown on July 9th. If you have been following this piece of news, you will be aware that the shutdown deadline is now just two days away. People who still have this malware on their machine will...

3 Security news updates you may have missed

 June 30, 2012

Estimated reading time: 2 minutes

Malware causes printer outage and gibberish A malicious program called Milicenso afflicted printers across various offices in the world causing them to print garbled data. India, the US, Europe and South America were the majorly afflicted territories. Milicenso has been used in the past by malicious cyber groups and it...