Dharma ransomware resurfaces with a new variant

Credit to Author: Shriram Munde| Date: Mon, 16 Apr 2018 06:43:19 +0000

A new variant of the Dharma ransomware (‘.arrow’) has been observed in the wild. This variant appends the extension ‘.arrow’ to the files it encrypts and spreads via spam emails.   How Dharma encrypts its victim’s files Once executed, the ‘.arrow’ variant of Dharma uses the below command to disable…

Read more

8 tips to avoid a spyware attack

Credit to Author: Rajiv Singha| Date: Thu, 12 Apr 2018 10:30:45 +0000

Spyware refers to software that spy on your Internet browsing activities, record keystrokes, and collect almost any type of data including your personal information such as credit/debit card or banking details, login IDs and passwords. In this post, we share 8 tips to avoid a spyware attack and keep your…

Read more

Can you spot a phishing email? Take this test and find out!

Credit to Author: Rajiv Singha| Date: Thu, 05 Apr 2018 09:30:20 +0000

One of the oldest, nastiest and most lucrative tools used by hackers is phishing – a method to fool you into revealing your personal and sensitive information such as debit/card numbers, passwords, ATM pin, date of birth – any data that can personal identify you. Here’s an example of a…

Read more

Can you solve this cybersecurity crossword?

Credit to Author: Rajiv Singha| Date: Mon, 02 Apr 2018 13:30:15 +0000

Do you like solving crosswords? Well, we have a short cybersecurity crossword that will rattle your brain and also test how cyberaware you are. So, here’s what you have to do. > Solve the crossword below > Post your answers in the comment section below If you find this crossword…

Read more

9 security tips for using mobile payment apps

Credit to Author: Rajiv Singha| Date: Tue, 27 Mar 2018 11:00:34 +0000

Do you find it convenient to shop and bank online using mobile payment apps? Most would have ‘yes’ as an answer. But, are we letting ‘convenience’ overshadow ‘security’? An attacker can easily get hold of your personal and banking information if the app or the mobile site you are using…

Read more

9 safety tips for safe mobile payments

Credit to Author: Rajiv Singha| Date: Tue, 27 Mar 2018 11:00:34 +0000

Estimated reading time: 2 minutes Do you find it convenient to shop and bank online using mobile payment apps? Most would have ‘yes’ as an answer. But, are we letting ‘convenience’ overshadow ‘security’? An attacker can easily get hold of your personal and banking information if the app or the…

Read more

Beware of the new WhatsApp message scam that promises Rs. 1000/- Paytm cash!

Credit to Author: Rajiv Singha| Date: Tue, 20 Mar 2018 09:49:04 +0000

WhatsApp currently has over 200 million monthly active users in India. No wonder it has become a popular tool for scammers. Just last night, I received the following message from one of my friends on WhatsApp. Fig 1 The message is in Hindi and loosely translates to this… Open this…

Read more

An in-depth analysis of a new, emerging “.url” malware campaign – by Quick Heal Security Labs

Credit to Author: Pradeep Kulkarni| Date: Mon, 19 Mar 2018 14:19:13 +0000

Last week, we had blogged about the emergence of a new attack vector ‘.url’ which is used to spread malware. In this blog post, we will deep-dive into the attack chain of this ‘.url’ vector and elaborate on the Quant Loader malware which is actively making use of it. Let’s…

Read more

An in-depth analysis of a new, emerging “.url” malware campaign – An analysis by Quick Heal Security Labs

Credit to Author: Pradeep Kulkarni| Date: Mon, 19 Mar 2018 14:19:13 +0000

Last week, we had blogged about the emergence of a new attack vector ‘.url’ which is used to spread malware. In this blog post, we will deep-dive into the attack chain of this ‘.url’ vector and elaborate on the Quant Loader malware which is actively making use of it. Let’s…

Read more

An analysis of the Zenis ransomware by Quick Heal Security Labs

Credit to Author: Shriram Munde| Date: Mon, 19 Mar 2018 12:56:40 +0000

Quick Heal Security Labs has come across a new ransomware that goes by the name ‘Zenis’. The ransomware not only encrypts files but also intentionally deletes the infected system’s backup.   The behavior of Zenis ransomware Upon inside a computer, the ransomware performs the following checks before it starts encrypting…

Read more