Estimated reading time: 4 minutes
Cryptocurrencies are all the vogue now. This has resulted in the emergence of increasing cryptocurrency mining activities. Several platforms make mining services available to users. One such platform that provides JavaScript cryptocurrency miners for websites is CoinHive. Recently, we have analyzed a virus that infects user files with mining scripts. CoinHive is...Virus
Virus Infectors: a perpetual attack vector – A report by Quick Heal Security Labs
Estimated reading time: 5 minutes
2017 was the year of ransomware and cryptocurrency miners but we are still seeing infectors posing as a prominent attack vector. However, old infectors still remain a significant threat to users. In 2017, we observed a few old infector families making new versions of their old code, though no new...5 Common Myths that Stop People from Using an Antivirus
Estimated reading time: 3 minutes
While this may seem like a bit of an odd subject to venture into, in this blog post we will list out some common reasons, or excuses, why you don’t really need antivirus or an effective computer security for your home PC. Out of the millions of computer users around...Meet Chameleon – The Wi-Fi Virus that Spreads Like the Common Cold!
Estimated reading time: 2 minutes
Chameleon is a new virus in town that spreads between unprotected or poorly protected Wi-Fi access points (wireless router) just like the common cold spreads between humans. Wi-Fi access points (APs) are devices that transmit and receive Wi-Fi signal. In other words, whenever you are accessing Wi-Fi, your device is...How to Recover from a Malware Infection
Estimated reading time: 3 minutes
Avoiding and preventing malware on a computer is far simpler than removing it from an infected machine. Nevertheless, once a machine has been infected with malware, it is imperative to remove it immediately. Clear signs like lowered speed, popups, disabled functionality and more, indicate the presence of malware on a...Security news and updates from the last week
Estimated reading time: 1 minute
India – Where most of the world’s spam originates from A large amount of email spam originates in India. This interesting report shows that most of the world’s spam actually originates in India. Facebook has more than 50 million duplicate user accounts worldwide Facebook officials have claimed that there are...Malware Alert! The risk of image searches on Google and Bing
Estimated reading time: 3 minutes
When was the last time you carried out an image search on Google Images? Did you check the website the image was hosted on before you downloaded it on your computer or smartphone? Unknown to you, image searches are one of the biggest channels of malware over the Internet. Security...The first computer virus was designed for an Apple computer, by a 15 year old
Estimated reading time: 3 minutes
Contrary to popular belief, the first widespread computer virus that actively spread ‘in-the-wild’ was designed to target Apple computers. This might surprise some staunch Apple users who still feel that their Macs are completely invincible and cannot be infected with any kind of malware whatsoever. In this post we will...A history of Mac malware: The Apple of a virus developer’s eye
Estimated reading time: 4 minutes
Apple Macs are falsely believed to be invincible and completely safe against malware threats and security breaches. But as we recently discussed, this perpetual myth has gradually been broken over the years. Apple has subtly acknowledged this fact over the last year or so and has made major upheavals in...