Beware of these fake apps on Google Play Store that use ‘Jio/Jeo’ in their names

Jio took the Indian telecom market by storm when it made its entry with free unlimited calls and data offers. People went into a kind of frenzy for acquiring this service. And with its ‘truly unbelievable’ offers, Jio also launched an array of apps on Google Play Store such as Jio4GVoice, JioChat, JioMusic, etc. And […]

A technical analysis of the Java RAT (Remote Access Trojan) Malware

Remote Access Trojans are programs that allow attackers to gain unauthorized access to a targeted computer without the victim’s knowledge. Java RAT malware is a Trojan-Dropper written in Java. It is designed to steal passwords, access files, for keylogging (recording what the user types on the keyboard) and for screen-capture. Information collected by a RAT […]

A technical analysis of the recent Petya ransomware attack

Earlier this week, a new variant of Petya Ransomware was spotted which was creating havoc all over Europe as well as major parts of Asia including India. The major target for Petya has been Ukraine as its major banks and also the power services were hit by the attack. It’s a new version of the […]

DOs and DON’Ts to stay safe from Ransomware (infographic)

Unless you live in a cave, you would definitely know what is a ransomware. It is a malware that is keeping Internet users awake at nights and restless during the day. It does not strike with a warning, and when it does it does not leave without causing a catastrophe. Ransomware is a malware that […]

Quick_Heal_Av_Lab_certificate

Quick Heal Total Security receives BEST+++ certification from AVLab

AVLab is an independent organization that conducts tests on security software for corporate networks and individual user devices. These tests are conducted by using malicious software, tools, and bypassing security techniques that are used in real cyberattacks. In April 2017, AVLab conducted a ‘Protection test against drive-by download attacks’. What does drive-by download mean? A […]

AES-NI Ransomware adopts combination of Fileless and Code Injection technique

Cybercriminals are adopting unique ways for spreading malware and this has been evident in the cases of the Cerber ransomware where the RIG exploit was used and the WannaCry ransomware which used the SMBv1 vulnerability. And now it’s the AES-NI ransomware which uses a combination of fileless and code injection technique. This threat involves the […]

Beware! The TrickBot Trojan is back

TrickBot Trojan was first identified in mid-2016 and considered similar to the Dyreza banking Trojan. Initially, the payload (the component of a computer virus that executes a malicious activity) was spreading through a malvertising campaign using the Rig Exploit Kit. From our current findings, we have found that TrickBot has changed its propagation technique and […]

CertLock Trojan can disable your antivirus software

An antivirus software keeps your computer safe from malware, viruses, online threats, and suspicious or harmful elements. Although bypassing this protective guard is a difficult task for attackers, they never stop trying to do so. Recently, we came across a malware that is designed to interfere with the infected system’s security software by disallowing its […]

Watch out for Android Ransomware – It’s rising!

It’s not only PC ransomware that you should be worrying about. Android ransomware too is on the rise… Android ransomware has grown by 200% according to the study done by Quick Heal Security Labs for its Q1 Threat Report. Click here to read the full report Android ransomware work in the same fashion like PC […]

7 Deadly Internet Security Mistakes

Simply installing an antivirus software on your PC cannot guarantee your online safety. Internet security is an ongoing process, where you need to stay on guard against the latest threats. Run through the below post and check if you are making any of these 7 deadly Internet Security mistakes. 1. Trusting unknown emails Do you […]