Anatova, A modular ransomware

Credit to Author: Shriram Munde| Date: Tue, 29 Jan 2019 06:09:49 +0000

While everyone was engaged in new year celebrations, malware authors were busy creating new ransomware for 2019. Quick Heal Security Labs has discovered the first ransomware of 2019 — Anatova ransomware. During our analysis, we found that Anatova is not just ransomware but a modular one. By modular ransomware we…

Read more

GandCrab Ransomware along with Monero Miner and Spammer

Credit to Author: Prashant Tilekar| Date: Thu, 24 Jan 2019 11:54:00 +0000

Recently we saw a new campaign through spam mail attachment- zip file. It contains JavaScript file which delivers a bundle of GandCrab Ransomware, Monero miner and Spammer. This bundle of multiple malware variants is nothing new, it is common for ransomware to be paired with miner and spammer. This type…

Read more

Sophisticated Ransomware : “Katyusha”

Credit to Author: Ghanshyam More| Date: Fri, 14 Dec 2018 10:59:58 +0000

For several months, Quick Heal Security Labs has been observing an increase in ransomware, we have found one more interesting ransomware which encrypts files and adds extension “.katyusha” and demands for an amount of 0.5 btc within three days and threatens to release the data to public download if the ransom is not…

Read more

Beware of getting scammed during Black Friday & Cyber Monday SALE!!

Credit to Author: Sushmita Kalashikar| Date: Fri, 23 Nov 2018 14:11:57 +0000

  As holiday shoppers gear up for a shopping spree on Black Friday and Cyber Monday, it’s important to be on alert to protect yourself from getting scammed. Here are few tips to help you enjoy a carefree and scam free holiday shopping season: Do not get tricked by similar…

Read more

How to differentiate between spam and phishing emails?

Credit to Author: Sushmita Kalashikar| Date: Thu, 11 Oct 2018 10:58:52 +0000

Emails today have become an integral part of our day-to-day life and this has made it a child’s play for spammers to lure people into opening fraudulent emails and attachments. Thus, while you are using emails for your everyday personal or official use, it is important to realize that the…

Read more

You’ve Been Hit By Ransomware. Now What?

Credit to Author: Sushmita Kalashikar| Date: Tue, 09 Oct 2018 05:20:55 +0000

“ALL YOUR FILES HAVE BEEN ENCRYPTED”   You see that line flashing on your laptop or desktop and suddenly your adrenaline level shoots up with hundreds of questions already hitting your mind… How Do I Remove that Message? Why Can’t I Access My System? Will I Lose All My Work?…

Read more

How can my Facebook account be misused if hacked?

Credit to Author: Sushmita Kalashikar| Date: Thu, 04 Oct 2018 05:02:24 +0000

At a time when most of us are living in a virtual world, where we are connected to our friends and family mostly through social networking sites, imagine what it would be like to find your social media account hacked!! That’s exactly what happened with 50 million of Facebook users…

Read more

Emerging trend of spreading malware through IQY files

Credit to Author: Prashant Tilekar| Date: Wed, 03 Oct 2018 10:05:14 +0000

Nowadays attackers are searching for new techniques to spread malware, recently we came across a new emerging way to deliver malware through IQY file. Till now we had seen spread of malware through various file types and chains such as Word document, Script, JAVA files. Fig 1: Attack chain IQY file…

Read more

Immediate steps to follow if you are a victim of banking fraud

Credit to Author: Sushmita Kalashikar| Date: Fri, 28 Sep 2018 07:18:20 +0000

In the recent past, innumerable cases have surfaced where there have been incidences of fraudulent charges on credit cards or unauthorized access to personal information. In wake of such rising cases of identity theft and data breaches, it can be extremely useful to know about actions to take once you…

Read more

Have You Received A Call To Replace Your Stripe-Only Card With EMV Chip Card Yet?

Credit to Author: Sushmita Kalashikar| Date: Tue, 25 Sep 2018 09:29:17 +0000

In case you have received a reminder from your bank asking you to replace your stripe-only card with an EMV chip card and you have no idea why this change is being implemented, then you are at the right place. As per recent instructions received from the Reserve Bank of…

Read more

Easy way to bypass passcode lock screens on iPhones, iPads running iOS 12

Credit to Author: Darlene Storm, Michelle Davidson| Date: Tue, 18 Sep 2018 11:16:00 -0700

Update for iOS 12

With iOS 12 and iPhones that have Touch ID, you can still bypass the iPhone lock screen and trick Siri into getting into a person’s phone. The bypass is the same as it was in earlier versions of the operating system:

  • Press the home button using a finger not associated with your fingerprint authentication, prompting Siri to wake up.
  • Say to Siri: Cellular data.

Siri then opens the cellular data settings where you can turn off cellular data.

As was the case before, anyone can do this. It doesn’t have to be the person who “trained” Siri.

To read this article in full, please click here

Read more