Stay Away from all these Apps on Google Play

This is a precautionary advisory for all our readers who use Android smartphones. A Trojan detected by Quick Heal as Android.Xynyin.C, is known to have been injected into more than 60 gaming apps available in the Google Play Store. According to the intelligence reports received from our Malware Analysts, the apps that were compromised with […]

5 Best Instagram Security Tips

When Instagram was formed as an iOS-only photo sharing app in 2010, nobody imagined how big and popular the service could actually get. Today Instagram is available over all major mobile platforms and has more than 400 million monthly active users around the world. The key features of Instagram are photo sharing, video sharing (up […]

VirTool Injector – Esoteric Bot

Quick Heal Threat Research Labs is tracking a malware known as Esoteric Bot. This blog post provides a technical overview into the behavior, work flow, and infection vector of this malware. It also discusses its preventive measures that must be taken by users. Infection Vector of Esoteric Bot Spam emails or drive-by-downloads are the common […]

Decryption Tool for TeslaCrypt Ransomware Infection

If our readers can recall, in an earliest post we had discussed TeslaCrypt – what it is and what it does. This post has some important information related to recent findings from our Labs. Read on to know more. First, a brief flashback! TeslaCrypt belongs to the family of ransomware; it was detected in February […]

Quick Heal AntiVirus Pro vs Quick Heal Internet Security: What’s the difference?

In today’s post, you will get to learn some of the basic and important differences between two of our products – Quick Heal AntiVirus Pro vs Quick Heal Internet Security. While, both these products work to defend your system against malware, viruses and other threats, they differ on the level of strength of protection that […]

Security Habit to Make: Strong Passwords for Stronger Security

In continuation to the first part of Security Habits to Break and Make in 2016, this one is the second part that talks about choosing strong and not-so-constant passwords. No.2 Security Habit to Break: Having devices that are not password protected. No.2 Security Habit to Make: Create complex and strong passwords for your device and […]