Blog

Security

Maze ransomware continues to be a threat to the consumers

Estimated reading time: 6 minutes

Maze is a recently highlighted ransomware among the ever-growing list of ransomware families. The ransomware is active from the past one year, although it came into limelight due to its new approach of publishing sensitive data of infected customers publicly. The malware uses different techniques to gain entry like the...

Take your browser security to the next level!

 February 24, 2020

Estimated reading time: 2 minutes

  Today, almost every computer user leverages a variety of web browsers to surf the internet — Microsoft Internet Explorer, Mozilla Firefox, and Apple Safari are some of the popular browsers in use in recent times. It is very important to configure internet browser(s) in a secure way because vulnerable web...

Why secure your IoT Devices?

 February 6, 2020
Why secure your IoT Devices

Estimated reading time: 4 minutes

Introduction to IoT This blog describes one of the current disruptive technologies in the market, i.e. IoT (Internet of Things) devices. The Internet of things (IoT) is the Internet of connected physical devices, vehicles, appliances and everyday objects that can collect & share information without any intervention. Due to IoT...

HorseDeal Riding on The Curveball!

Estimated reading time: 5 minutes

It’s surprising to see how quickly attackers make use of new vulnerabilities in malware campaigns. Microsoft recently patched a very interesting vulnerability in their monthly Patch Tuesday update for January 2020. It’s a spoofing vulnerability in Windows CryptoAPI (Crypt32.dll) validation mechanism for Elliptic Curve Cryptography (ECC) certificates. An attacker could...

A sloppy click can exfiltrate your important data!

 February 3, 2020

Estimated reading time: 4 minutes

Phishing email still remains one of the top malware propagation medium. Recently, we came across an interesting phishing email containing couple of Jumpshare links pointing to malicious components. Jumpshare is an online file sharing service and often cyber criminals abuse these kind of file sharing services. Upon clicking on one of the links in...

Ako Ransomware targeting businesses using RaaS

Estimated reading time: 5 minutes

Ako Ransomware targeting businesses using RaaS Quick Heal security researchers recently observed ransomware that uses RaaS (Ransomware as a Service) which is a subpart of MaaS (Malware as a Service). Before delving into the AKO ransomware or RaaS, one must understand what Malware as a Service means, as it is...

What’s new in macOS Catalina ‘Security and Privacy’?

 November 1, 2019

Estimated reading time: 4 minutes

Apple released macOS 10.15 (Catalina) on 7th Oct 2019 and now it is publicly available for download. With multiple features presented at the WWDC 2019, here’s an overview of the new security and privacy features introduced in Catalina. Enhanced Gatekeeper Gatekeeper, is an important outer layer of security, designed to...

The Free Mobile Anti-virus you are using can be a Fake!

 September 9, 2019

Estimated reading time: 4 minutes

Quick Heal Security Labs recently spotted multiple Fake Antivirus Apps on Google Play Store. What’s more alarming, is that one of these fake AV Apps has been downloaded 100000+ times already. These Apps appear to be genuine Anti-virus/virus-removal Apps with names like Virus Cleaner, Antivirus security, etc., but do not...