#Malware KKNPP Attack: Tracking the DTrack! The recent cyber-attack on Kudankulam Nuclear Power Plant (KKNPP) has been confirmed by the officials and yet again security of Quick Heal Security Labs / 6 years Comment (0) (431)
#Android #Antivirus #Malware #Mobile Security #WhatsApp The infamous Spyware – Pegasus, The NSO Group and The WhatsApp snooping saga The Indian media is abuzz these days with several news and allegations around snooping on several Indian citizens through a Prachi Sudame / 6 years Comment (0) (212)
#Android #Antivirus #Applications #Malware #Youtube Quick Heal reports 29 malicious apps with 10 million+ downloads on Google Play Store Quick Heal Security Labs reported 29 malicious apps found on Google Play Store, which have a collective download count of more Digvijay Mane / 6 years Comment (5) (357)
#Android #Antivirus #Malware #Mobile Security #Security The Free Mobile Anti-virus you are using can be a Fake! Quick Heal Security Labs recently spotted multiple Fake Antivirus Apps on Google Play Store. What’s more alarming, is that one Prachi Sudame / 6 years Comment (22) (305)
#Malware PowerShell: Living off the land! Trend of PowerShell based malware is increasing. General trend observed shows that malware authors use new techniques for infection and Aniruddha Dolas / 6 years Comment (0) (254)
#Android #Google #Malware #Mobile Security Alert! 27 apps found on Google Play Store that prompt you to install Fake Google Play Store Quick Heal Security Lab spotted 27 malicious apps of dropper category on official “Google Play Store”. These apps have been Vaibhav Billade / 6 years Comment (0) (935)
#Android #Home Security #Malware Trinity Miner using open ADB port to target IoT devices In the 21st century, life is becoming smart and evolving at a fast pace. Even day to day gadgets are Vallabh Chole / 7 years Comment (0) (287)
#Antivirus #Applications #Cyber crime #Malware #Microsoft windows #Ransomware #Threat Report Ransomware As A Tool – LockerGoga Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have Ghanshyam More / 7 years Comment (0) (384)
#Cyber safety #Email #Malware #Phishing #Security #Social Engineering #Spam Beware! Email attachments can make you victim of spear phishing attacks In the last few months, we’ve seen a sudden increase in Spear Phishing attacks. Spear phishing is a variation of a phishing Prashant Tilekar / 7 years Comment (0) (430)
#Hacker #Malware #Ransomware APT-27 like Newcore RAT, Virut exploiting MySQL for targeted attacks on enterprise In today’s world data is everything, and to store and process this large amount of data, everyone started using computing Vallabh Chole / 7 years Comment (0) (228)