# Tags

Beware of the Godless Malware

You might have heard of the Godless Android malware that surfaced last month. This post explains some important facts around the malware, and how you can stay away from it. What is the Godless Malware? Carrying a bit of an intimidating name, ‘Godless’ is a malware that targets Android phones that run Android Lollipop 5.1 […]

Solution to system startup issue faced by Quick Heal users

Some of our users might be facing system startup issues. This blog post explains the solution to the problem. Problem description A certain group of Quick Heal users has reported to be experiencing system startup issues. The issue occurred after users received the update that was released on 30th June 2016 at around 7:50 PM. Affected […]

ATM_Skimming

4 tips on how to protect yourself from ATM skimming

It so happens that a vacation taken by a cyber security expert turns out to be yet another eye-opener for many. While holidaying in Vienna, Austria, cyber security expert Benjamin Tedesco comes across a well-camouflaged ATM skimming machine. Before we continue, let us tell you a little about what is ATM skimming? For those who […]

5 Easy Tips to Free up Space on Your Android

Is your smartphone not as zappy as it used to be when you bought it? If yes, then you can blame low memory space for this. When your phone runs out of memory, it refuses to take any more pics or videos, install updates or run smoothly – all obvious signs that the old boy […]

Phishing emails contain ransomware

Phishing emails just got more dangerous! 93% of them contain ransomware

If you thought phishing emails are less dangerous, then you would be terribly wrong. According to a recent report, almost 93% of phishing emails now carry the ransomware malware. First, what is phishing? Phishing is an age-old trick used by scammers and hackers to trick people into revealing their personal and financial information. This infographic […]

New Common Vulnerabilities and Exposure (CVE) in Spammer’s toolkit

The Quick Heal Malware Intelligence Reporting System has made a recent observation about a CVE (Common Vulnerabilities and Exposures) known as CVE-2015-2545 being actively used in an online spam campaign. The campaign begins with targeted users receiving a spam email with an attached malicious document. Below are some common attachment names used in this spam […]

Infostealer Campaign detected in the wild

Quick Heal Threat Research Lab has recently observed an active cybercrime campaign designed to steal user info. The campaign has been noticed to make use of three keyloggers (malicious software that records information entered by a user on their computer keyboard) iSpy logger, Predator logger and Knight Logger. These software are easily available on the […]