GandCrab says, “We will become back very soon! ;)”

Credit to Author: Anant Pulgam| Date: Tue, 18 Dec 2018 12:44:21 +0000

GandCrab has been in the wild since last week of January 2018. Over the period it kept learning from its mistakes and GandCrab’s agile development grabbed the attention of many security researchers. From moving its servers to Namecoin powered Top Level Domain (.BIT TLD) servers after the first breach, then learning from…

Read more

Stay alert when planning your travels this holiday season

Credit to Author: Sushmita Kalashikar| Date: Tue, 18 Dec 2018 07:39:54 +0000

Planning a trip this holiday season? While, you spend a considerable amount of time shuffling money on online bookings for flights, hotels and cabs, take care that you DO NOT share your details on doubtful looking travel sites. Just like holidays are a busy time for you and me, it’s…

Read more

Ghost Has Arrived

Credit to Author: Ghanshyam More| Date: Fri, 14 Dec 2018 11:58:50 +0000

On the back of an upswing in Ransomware activity, we decided to carry out an in-depth analysis of Ghost Ransomware. Interesting fact about this malware is that it uses multiple components to encrypt user files. Technical Analysis : Main malware executable (Ghost.exe) is compiled using the DotNet Framework. The infection…

Read more

Sophisticated Ransomware : “Katyusha”

Credit to Author: Ghanshyam More| Date: Fri, 14 Dec 2018 10:59:58 +0000

For several months, Quick Heal Security Labs has been observing an increase in ransomware, we have found one more interesting ransomware which encrypts files and adds extension “.katyusha” and demands for an amount of 0.5 btc within three days and threatens to release the data to public download if the ransom is not…

Read more

CVE-2018-15982- Adobe Flash Player use after free (Zero Day) vulnerability alert!

Credit to Author: Prashant Tilekar| Date: Thu, 06 Dec 2018 10:52:25 +0000

The recent zero-day vulnerability CVE-2018-15982 in Adobe Flash Player enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSB18-42 on December 5, 2018 to address this issue. According to Adobe, the in-wild exploit is being used in targeted attacks. Vulnerable Versions Adobe…

Read more

8 reasons not to count on your expired antivirus software to protect you!!

Credit to Author: Sushmita Kalashikar| Date: Mon, 26 Nov 2018 05:52:43 +0000

You are at your computer, engaged in some important work and suddenly a message pops up on the screen, “Your Antivirus software license has expired”. You conveniently choose to ignore the notification, intending to get back to it whenever you get free, but, you never do! What Happens when Antivirus…

Read more

Beware of getting scammed during Black Friday & Cyber Monday SALE!!

Credit to Author: Sushmita Kalashikar| Date: Fri, 23 Nov 2018 14:11:57 +0000

  As holiday shoppers gear up for a shopping spree on Black Friday and Cyber Monday, it’s important to be on alert to protect yourself from getting scammed. Here are few tips to help you enjoy a carefree and scam free holiday shopping season: Do not get tricked by similar…

Read more

Teaching kids the good, the bad and the ugly of the Internet

Credit to Author: Ankita Ashesh| Date: Wed, 14 Nov 2018 07:46:58 +0000

This children’s day let’s talk about one of the most relevant topics for kids these days- the Internet! Children spend a lot of their time doing homework, talking to friends or playing games on the internet. For parents, it is more important than ever to teach their kids early on how…

Read more

This Diwali gift your kids online safety with parental control

Credit to Author: Sushmita Kalashikar| Date: Fri, 02 Nov 2018 11:10:58 +0000

Diwali holidays are just round the corner and your kids might have already received their holiday assignments. But, the kids are more excited about the fact that they will now have ample time to browse on the internet. While you want your kids to really enjoy the holidays, there’s a…

Read more

Obfuscated Equation Editor Exploit (CVE-2017-11882) spreading Hawkeye Keylogger

Credit to Author: Pradeep Kulkarni| Date: Thu, 01 Nov 2018 06:17:45 +0000

Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft’s equation editor exploit to spread Hawkeye keylogger. Cybercriminals use different techniques to steal confidential data. Now they are offering…

Read more

Ransomware attacks through Remote Access are on rise. Secure your system now!!

Credit to Author: Sushmita Kalashikar| Date: Fri, 26 Oct 2018 13:43:52 +0000

Once again ransomware attacks are on the rise and this can leave your systems vulnerable to critical data loss and breach. In fact, the recent outbreak of ransomware allows cyber criminals to easily gain access to your computer through Remote Desktop using brute-force technique, which is capable of cracking weak…

Read more