Deep analysis of AZORult – The information exfiltrator

Credit to Author: Preksha Saxena| Date: Tue, 16 Oct 2018 10:35:50 +0000

While the current focus in the cyberspace is on Ransomware and Cryptominers there are other prevalent threat actors silently making their way into victim’s machine in order to comprise it for malicious purpose. During the daily threat hunting task,Quick Heal Security labs came across a blocked URL by Quick Heal’s…

Read more

How to differentiate between spam and phishing emails?

Credit to Author: Sushmita Kalashikar| Date: Thu, 11 Oct 2018 10:58:52 +0000

Emails today have become an integral part of our day-to-day life and this has made it a child’s play for spammers to lure people into opening fraudulent emails and attachments. Thus, while you are using emails for your everyday personal or official use, it is important to realize that the…

Read more

You’ve Been Hit By Ransomware. Now What?

Credit to Author: Sushmita Kalashikar| Date: Tue, 09 Oct 2018 05:20:55 +0000

“ALL YOUR FILES HAVE BEEN ENCRYPTED”   You see that line flashing on your laptop or desktop and suddenly your adrenaline level shoots up with hundreds of questions already hitting your mind… How Do I Remove that Message? Why Can’t I Access My System? Will I Lose All My Work?…

Read more

How can my Facebook account be misused if hacked?

Credit to Author: Sushmita Kalashikar| Date: Thu, 04 Oct 2018 05:02:24 +0000

At a time when most of us are living in a virtual world, where we are connected to our friends and family mostly through social networking sites, imagine what it would be like to find your social media account hacked!! That’s exactly what happened with 50 million of Facebook users…

Read more

Emerging trend of spreading malware through IQY files

Credit to Author: Prashant Tilekar| Date: Wed, 03 Oct 2018 10:05:14 +0000

Nowadays attackers are searching for new techniques to spread malware, recently we came across a new emerging way to deliver malware through IQY file. Till now we had seen spread of malware through various file types and chains such as Word document, Script, JAVA files. Fig 1: Attack chain IQY file…

Read more

50 Million Facebook Accounts Hacked – Time to act before it’s too late!

Credit to Author: Sushmita Kalashikar| Date: Mon, 01 Oct 2018 11:53:39 +0000

The afternoon of September 28th 2018 brought in a wave of shock for 50 million Facebook users, when they found themselves logged out of Facebook!! In one of the worst data breach attacks in the history of Facebook, over 90 million users on Friday afternoon, were forced to log out…

Read more

Immediate steps to follow if you are a victim of banking fraud

Credit to Author: Sushmita Kalashikar| Date: Fri, 28 Sep 2018 07:18:20 +0000

In the recent past, innumerable cases have surfaced where there have been incidences of fraudulent charges on credit cards or unauthorized access to personal information. In wake of such rising cases of identity theft and data breaches, it can be extremely useful to know about actions to take once you…

Read more

The Need For Anti-Virus As Mobile Wallet Transactions Hit Record 14,170 Crore

Credit to Author: Sushmita Kalashikar| Date: Wed, 26 Sep 2018 05:24:43 +0000

After mobile wallet transactions experienced a setback owing to the mandatory know-your-customer (KYC) requirements in March, mobile wallet companies have bounced back with a record transaction of 14,170 crore in May, the highest recorded transaction after January. Thus, M-Wallets are back in vogue with companies once again succeeding in convincing…

Read more

Know your ATM card and the various frauds related to it

Credit to Author: Ankita Ashesh| Date: Wed, 26 Sep 2018 03:30:57 +0000

It’s a plastic world we live in. The proliferation of plastic money everywhere, in the form of debit and credit cards, means that the concept of paper money is soon becoming obsolete. Swiping a card seems to have become almost a natural instinct. The total number of cash withdrawals at…

Read more

E-commerce transactions: Tips to stay safe when shopping online

Credit to Author: Ankita Ashesh| Date: Tue, 25 Sep 2018 10:25:16 +0000

Today’s new-generation customer has all the luxuries. At the click of a button (or a touch, on a mobile phone), they can buy literally anything they want. The arrival of online marketplaces like Flipkart, Amazon and thousands of other similar websites means that the basic premise of going out of…

Read more