Blog
Quick heal blog

Ransomware As A Tool – LockerGoga

 July 3, 2019

Estimated reading time: 5 minutes

Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a sophisticated one. The Ransomware as a Tool has evolved in wild...

Beware! Email attachments can make you victim of spear phishing attacks

 June 21, 2019

Estimated reading time: 4 minutes

In the last few months, we’ve seen a sudden increase in Spear Phishing attacks. Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. In this type of attack, the attacker uses social engineering tricks and some...

The website I visited behaves weirdly. I wonder if I’m hacked?

 June 17, 2019

Estimated reading time: 3 minutes

After a busy day at office or business, you settle down on the sofa at home with coffee and you want to catch your favourite show on your phone or TV. While streaming you want to make a payment for your bills that are due. You connect to your Wi-Fi...

What makes Quick Heal’s Next Generation Suite of Features a SMART choice to protect your privacy?

 May 29, 2019

Estimated reading time: 2 minutes

The cyber threat landscape is evolving every second, with thousands of new potential threats being detected every single day. With people becoming more and more conscious about their privacy and private data, such evolving threats can have a significant impact on the personal and financial life of people. In order...

APT-27 like Newcore RAT, Virut exploiting MySQL for targeted attacks on enterprise

 May 28, 2019

Estimated reading time: 7 minutes

In today’s world data is everything, and to store and process this large amount of data, everyone started using computing devices. Database servers which are used for storing this precious data on computing devices include MySQL, MongoDB, MSSQL, etc. But unfortunately, not everyone is conscious about its security. In fact, approximately...

CVE-2019-11815: Experts discovered a privilege escalation vulnerability in the Linux Kernel

 May 27, 2019

Estimated reading time: 2 minutes

Red Hat engineers and experts discovered a memory corruption vulnerability in Linux kernel, which is basically a flaw while implementation of RDS (Remote desktop Protocol) over TCP. This flaw has affected Red Hat, Ubuntu, Debian and SUSE and security advisories have been issued for all. This flaw could enable an...

Quick Heal supports the Windows 10 May 2019 Update

 May 22, 2019

Estimated reading time: 2 minutes

As part of the Windows 10 Updates, Microsoft has now come up with a new update for Windows 10 PCs. It’s called Windows 10 19H1 (Windows 10 May 2019 Update). This post lists down some of the highlights of this particular update and Quick Heal’s compatibility with the OS. Highlights...

What is Emotet?

 May 22, 2019

Estimated reading time: 4 minutes

Emotet malware was first identified in 2014 as Banking trojan. Emotet has evolved from banking trojan to threat distributor till now. It has hit many organizations very badly in 2018 with its functionalities like spamming and spreading. Further with its widespread rich/existence at many organizations, it became threat distributor. Since...