Blog

Virus

MIRUS – a cryptomining virus

  • 44
    Shares
 February 27, 2018

Estimated reading time: 4 minutes

Cryptocurrencies are all the vogue now. This has resulted in the emergence of increasing cryptocurrency mining activities. Several platforms make mining services available to users. One such platform that provides JavaScript cryptocurrency miners for websites is CoinHive. Recently, we have analyzed a virus that infects user files with mining scripts. CoinHive is...

Virus Infectors: a perpetual attack vector – A report by Quick Heal Security Labs

 January 12, 2018

Estimated reading time: 5 minutes

2017 was the year of ransomware and cryptocurrency miners but we are still seeing infectors posing as a prominent attack vector. However, old infectors still remain a significant threat to users. In 2017, we observed a few old infector families making new versions of their old code, though no new...

5 Common Myths that Stop People from Using an Antivirus

 August 26, 2014

Estimated reading time: 3 minutes

While this may seem like a bit of an odd subject to venture into, in this blog post we will list out some common reasons, or excuses, why you don’t really need antivirus or an effective computer security for your home PC. Out of the millions of computer users around...

1.2 billion passwords stolen and other IT security news

 August 11, 2014

Estimated reading time: 3 minutes

A massive data breach was discovered in Russia recently wherein more than 1.2 billion passwords have been stolen. This is one of the biggest data breaches in recent memory, and we recommend that online users change their passwords immediately. Read on for other IT security news from the week gone...

Meet Chameleon – The Wi-Fi Virus that Spreads Like the Common Cold!

 March 7, 2014

Estimated reading time: 2 minutes

Chameleon is a new virus in town that spreads between unprotected or poorly protected Wi-Fi access points (wireless router) just like the common cold spreads between humans. Wi-Fi access points (APs) are devices that transmit and receive Wi-Fi signal. In other words, whenever you are accessing Wi-Fi, your device is...

How to Recover from a Malware Infection

  • 1
    Share
 March 4, 2014

Estimated reading time: 3 minutes

Avoiding and preventing malware on a computer is far simpler than removing it from an infected machine. Nevertheless, once a machine has been infected with malware, it is imperative to remove it immediately. Clear signs like lowered speed, popups, disabled functionality and more, indicate the presence of malware on a...

Security news and updates from the last week

 February 15, 2013

Estimated reading time: 1 minute

India – Where most of the world’s spam originates from A large amount of email spam originates in India. This interesting report shows that most of the world’s spam actually originates in India. Facebook has more than 50 million duplicate user accounts worldwide Facebook officials have claimed that there are...

Malware Alert! The risk of image searches on Google and Bing

 February 13, 2013

Estimated reading time: 3 minutes

When was the last time you carried out an image search on Google Images? Did you check the website the image was hosted on before you downloaded it on your computer or smartphone? Unknown to you, image searches are one of the biggest channels of malware over the Internet. Security...

The first computer virus was designed for an Apple computer, by a 15 year old

 February 6, 2013

Estimated reading time: 3 minutes

Contrary to popular belief, the first widespread computer virus that actively spread ‘in-the-wild’ was designed to target Apple computers. This might surprise some staunch Apple users who still feel that their Macs are completely invincible and cannot be infected with any kind of malware whatsoever. In this post we will...

A history of Mac malware: The Apple of a virus developer’s eye

 January 31, 2013

Estimated reading time: 4 minutes

Apple Macs are falsely believed to be invincible and completely safe against malware threats and security breaches. But as we recently discussed, this perpetual myth has gradually been broken over the years. Apple has subtly acknowledged this fact over the last year or so and has made major upheavals in...