Alert! Fake Pokémon GO apps are on the rise

Mobile gaming apps are nothing new anymore. Thousands of them come and go, probably every week. But, there is a time when an app comes along that takes the entire world by storm. I am talking about the Pokémon GO app which has become the new Internet darling, sensation, rage; whatever you may want to […]

Beware of the Godless Malware

You might have heard of the Godless Android malware that surfaced last month. This post explains some important facts around the malware, and how you can stay away from it. What is the Godless Malware? Carrying a bit of an intimidating name, ‘Godless’ is a malware that targets Android phones that run Android Lollipop 5.1 […]

The Rio Olympics: Big Event. Bigger Stakes. Huge Online Scams

The month of August will witness some of the best performances by world class athletes in 2016 Rio Olympics. Considering the magnitude of the event, the online scammers have made best use of the platform to launch phishing attacks, lottery scams, counterfeit offers, merchandising schemes and more. As athletes prepare energetically to bring laurels for […]

Solution to system startup issue faced by Quick Heal users

Some of our users might be facing system startup issues. This blog post explains the solution to the problem. Problem description A certain group of Quick Heal users has reported to be experiencing system startup issues. The issue occurred after users received the update that was released on 30th June 2016 at around 7:50 PM. Affected […]

ATM_Skimming

4 tips on how to protect yourself from ATM skimming

It so happens that a vacation taken by a cyber security expert turns out to be yet another eye-opener for many. While holidaying in Vienna, Austria, cyber security expert Benjamin Tedesco comes across a well-camouflaged ATM skimming machine. Before we continue, let us tell you a little about what is ATM skimming? For those who […]

Kovter: the fileless click fraud malware

Kovter Trojan has been in effect since 2013. Being fileless, Kovter is different and stealthier than other Trojan families. It employs various anti-debugging, anti-VM, anti-sandboxing techniques, and has checks for identification of different security analysis tools. It uses different encryption techniques for different purposes. Like other Trojans, Kovter gathers user data and sends it to […]