#Security Emerging trend of spreading malware through IQY files Nowadays attackers are searching for new techniques to spread malware, recently we came across a new emerging way to deliver Prashant Tilekar / 7 years Comment (2) (13)
#Security Beware of cyber attacks this holiday season! With a range of festivals throughout the festive months, this is truly a time of celebration and joy as people Ankita Ashesh / 7 years Comment (0) (13)
#Security CVE-2018-8440 – Task Scheduler ALPC Zero-Day Exploit in the Wild The recent zero-day vulnerability CVE-2018-8440 in Windows Task Scheduler enables attackers to perform a privilege elevation on targeted machines. Microsoft Sameer Patil / 7 years Comment (0) (14)
#Security I am invisible – Monero (XMR) Miner From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. Ghanshyam More / 7 years Comment (0) (15)
#Security Cryptocurrency miner hits IoT devices, mostly affects Brazil and Russia! According to a blogpost published on Aug 1, 2018, 200,000 routers in Brazil were compromised to deliver Cryptocurrency mining scripts Pradeep Kulkarni / 7 years Comment (0) (16)
#News #Security #Tips Beware of the Armage Ransomware – the File Destroyer! In July last week, Quick Heal Security Labs detected a new ransomware called Armage. It appends ‘.Armage’ extension to files Shriram Munde / 7 years Comment (1) (20)
#News #Security #Tips Beware of the ‘Free Cycle Distribution Yojana’ WhatsApp message. It’s fake! As India’s Independence Day (15th of August) approaches, messages about free distribution schemes are doing the rounds on WhatsApp. Just Ganesh Lakariya / 7 years Comment (0) (26)
#Security The evolution of a 4-year-old-threat Emotet: From an infamous Trojan to a complex threat distributer Emotet malware campaign has been existing for a long time. It comes frequently in intervals with different techniques and variants Aniruddha Dolas / 7 years Comment (0) (11)
#Security Your copy-paste habit can cost you your money How often do you store your important data in files? It’s very common, right? This data may be URLs, topics, Anant Pulgam / 7 years Comment (0) (15)
#Security Cryptojacking is When Someone Illegally Uses Your PC to Make Digital Money & 8 Facts What attracts more than a magnet? You might have guessed it right – it is money! And where there is Sakshat Karkare / 8 years Comment (0) (12)