Category

Malware attack

Auto Added by WPeMatico

Estimated reading time: 3 minutes Nowadays, everybody is aware of the term, ‘Novel Coronavirus.’ All over the world, 7.7 Billion people have gotten affected by Coronavirus directly or indirectly. It has impacted so badly that currently, entire mankind is frightened and worried about the future of their survival. As per sources, it originated in China...
Read More
Estimated reading time: 2 minutes There are approximately 451 million monthly active Internet users in India. This estimate from a report by the Internet and Mobile Association of India (IAMAI) is a staggering number. It puts India only second in terms of Internet users after China. Yet, if you see this number from a different...
Read More
Estimated reading time: 3 minutes Nowadays, everybody is aware of the term, ‘Novel Coronavirus.’ All over the world, 7.7 Billion people have gotten affected by Coronavirus directly or indirectly. It has impacted so badly that currently, entire mankind is frightened and worried about the future of their survival. As per sources, it originated in China...
Read More
Estimated reading time: 2 minutes Recently, Quick Heal Security Labs found an Android application present on the Google Play Store which was infected by Windows malware. The application is meant for Gionee SmartWatch configuration and visualizing the data through App. On further analyzing the App, we found few HTML files which were infected with Windows...
Read More
Estimated reading time: 4 minutes As the Coronavirus spreads across countries creating fear across the globe, everybody wants to stay on top of any information related to it wanting to remain safe and away from infected people. Malware authors are also taking advantage of this situation. Previously on the Android Playstore, there were many applications present  which claimed that they could provide Coronavirus tracking information. But Google has set up some rules for these types of applications and have considered these under the ‘Sensitive events’ category. According to policies from this rule, Google proactively removed many applications from Playstore to stop malware authors to take advantage of this situation. But malware authors have used another way to enter into the user’s phone....
Read More
Estimated reading time: 4 minutes As the Coronavirus spreads across countries creating fear across the globe, everybody wants to stay on top of any information related to it wanting to remain safe and away from infected people. Malware authors are also taking advantage of this situation. Previously on the Android Playstore, there were many applications present  which claimed that they could provide Coronavirus tracking information. But Google has set up some rules for these types of applications and have considered these under the ‘Sensitive events’ category. According to policies from this rule, Google proactively removed many applications from Playstore to stop malware authors to take advantage of this situation. But malware authors have used another way to enter into the user’s phone....
Read More
Estimated reading time: 2 minutes The video gaming industry has become the foremost entertainment medium worldwide as evidenced by its valuation. The market is estimated to reach an estimated $179.1 billion by 2024, growing at a CAGR of 6.4% from 2019 to 2024. And yet, perhaps because of its denotation as an ‘entertainment’ medium, the...
Read More
Estimated reading time: 5 minutes All of us, at some point in time,  must have heard the story of Wolf and the flock of sheep. The fooling trick used by the wicked wolf of pretending to be a sheep is still in use by many malware authors. They pretend to be genuine processes to achieve...
Read More
Estimated reading time: 2 minutes   Today, almost every computer user leverages a variety of web browsers to surf the internet — Microsoft Internet Explorer, Mozilla Firefox, and Apple Safari are some of the popular browsers in use in recent times. It is very important to configure internet browser(s) in a secure way because vulnerable web...
Read More
Estimated reading time: 2 minutes   Today, almost every computer user leverages a variety of web browsers to surf the internet — Microsoft Internet Explorer, Mozilla Firefox, and Apple Safari are some of the popular browsers in use in recent times. It is very important to configure internet browser(s) in a secure way because vulnerable web...
Read More
Estimated reading time: 5 minutes Ransomware authors keep exploring new ways to test their strengths against various malware evasion techniques. The ransomware known as “Ouroboros” is intensifying its footprint in the field by bringing more and more advancements in its behavior as it updates its version. This analysis provides the behaviour of version 6, few...
Read More
Estimated reading time: 5 minutes Quick Heal Security Labs recently came across a variant of Ryuk Ransomware which contains an additional feature of identifying and encrypting systems in a Local Area Network (LAN). This sample targets the systems which are present in sleep as well as the online state in the LAN. This sample is packed with...
Read More
Estimated reading time: 3 minutes Very recently, the Coronavirus that apparently originated from the Wuhan province in China has created pandemonium across the world creating an atmosphere of a health crisis for the global populace. As the news of the deadly Coronavirus creates waves of panic across the globe, cyberattackers are lurking into this phenomenon...
Read More
Estimated reading time: 1 minute In the last two days, we have received reports from Windows 7 users who have been unable to shut down or restart their PC and ran into the below error. While the exact cause of the issue is yet to be ascertained there is no official confirmation from Microsoft yet....
Read More
Estimated reading time: 4 minutes Introduction to IoT This blog describes one of the current disruptive technologies in the market, i.e. IoT (Internet of Things) devices. The Internet of things (IoT) is the Internet of connected physical devices, vehicles, appliances and everyday objects that can collect & share information without any intervention. Due to IoT...
Read More
Estimated reading time: 4 minutes Phishing email still remains one of the top malware propagation medium. Recently, we came across an interesting phishing email containing couple of Jumpshare links pointing to malicious components. Jumpshare is an online file sharing service and often cyber criminals abuse these kind of file sharing services. Upon clicking on one of the links in...
Read More
Estimated reading time: 5 minutes Ako Ransomware targeting businesses using RaaS Quick Heal security researchers recently observed ransomware that uses RaaS (Ransomware as a Service) which is a subpart of MaaS (Malware as a Service). Before delving into the AKO ransomware or RaaS, one must understand what Malware as a Service means, as it is...
Read More
Estimated reading time: 6 minutes From past few months at Quick-Heal Labs, we have been observing a sudden rise in Spear Phishing mail containing distinct file formats as attachment like IMG, ISO, etc. These new types of attachments are mainly used to deploy some well-known and older Remote Access Trojans. The subject of these emails...
Read More
Estimated reading time: 5 minutes Recently while threat hunting, Quick Heal Security Labs came across an unusual Node.js framework based Nodera ransomware. The use of Node.js framework is not seen commonly across malware families. Latest development by threat actors reveal a nasty and one-of-its-kind ransomware being created; one that uses Node.js framework, which enables it to infect Windows...
Read More
Estimated reading time: 2 minutes 14 Jan 2020 marked a huge day for Windows, as Microsoft ended support for Windows 7, the operating system that had been touching lives for nearly 11 years. Introduced almost a decade back, Windows 7 was designed basically to fix the failures that came with Windows Vista. The popularity of...
Read More
1 2
nationalcybersecurity.com

FREE
VIEW