Ransomware As A Tool – LockerGoga

Credit to Author: Ghanshyam More| Date: Wed, 03 Jul 2019 07:18:00 +0000

Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a sophisticated one. The Ransomware as a Tool has evolved in wild…

Read more

3059 android malware detected per day in 2018 – Are you still counting on free android antivirus for protection?

Credit to Author: Sushmita Kalashikar| Date: Fri, 22 Mar 2019 12:35:49 +0000

The incidents of cyber-attacks on smartphones, especially those working on the popular Android operating system, have been on a constant rise. However, a major reason people still continue to go in for android smartphones, is the fact that these are mostly cheap to buy. However, the year 2018 ended with…

Read more

A massive security flaw discovered in Skype. Fix not coming anytime soon.

Credit to Author: Shriram Munde| Date: Wed, 14 Feb 2018 09:10:30 +0000

Quick Heal Security Labs has recently learned about a serious vulnerability in Skype’s update installer – that’s the bad news. The worse news is, Microsoft is not going to patch the vulnerability anytime soon as this would require the updater to go through a ‘large code revision’. What is this…

Read more

“Who visits your Twitter profile” spam app brings week of chaos

Credit to Author: Christopher Boyd| Date: Tue, 23 Jan 2018 19:17:06 +0000

Last week saw a Twitter spam app claiming to show who “viewed your profile” and spreading throughout the social media platform. See how it spread, and what you can do to avoid being caught by this common scam.

Categories:

Tags:

(Read more…)

The post “Who visits your Twitter profile” spam app brings week of chaos appeared first on Malwarebytes Labs.

Read more

5 things you must know about the Uber data breach if you are worried about it

Credit to Author: Rajib Singha| Date: Thu, 23 Nov 2017 10:03:55 +0000

Uber_data_breachFor any business, suffering a data breach is bad. But, not informing its customers about the breach is downright worse. And Uber, a global transportation app company, has made itself into a glaring example of the above statement. Last Tuesday (21.11.2017), Uber Technologies revealed that hackers were able to compromise…

The post 5 things you must know about the Uber data breach if you are worried about it appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read more

Uber Data Breach! Should you be worried?

Credit to Author: Rajib Singha| Date: Thu, 23 Nov 2017 10:03:55 +0000

For any business, suffering a data breach is bad. But, not informing its customers about the breach is downright worse. And Uber, a global transportation app company, has made itself into a glaring example of the above statement. Last Tuesday (21.11.2017), Uber Technologies revealed that hackers were able to compromise…

The post Uber Data Breach! Should you be worried? appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read more

An Infosec Spring clean

Credit to Author: Christopher Boyd| Date: Tue, 02 May 2017 15:00:56 +0000

Spring has indeed sprung, but it’s never too late to have a wander through your security settings and features. Unfortunately, we have so many accounts these days that it’s hard to keep track of them all, but this round-up may help you on your way.

Categories:

Tags:

(Read more…)

The post An Infosec Spring clean appeared first on Malwarebytes Labs.

Read more

Dear Women, Define your Online Identity Securely

Credit to Author: Suhita Mazumdar| Date: Fri, 10 Mar 2017 09:46:23 +0000

Amazing women are everywhere. They have defined our past and are making our present better so that we can look forward to a better future. Women have always been more vocal, expressive and willing to share than men. And social networking has become one the most powerful platforms for them…

The post Dear Women, Define your Online Identity Securely appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read more