BEWARE: Fake Applications are Disguised as Legitimate Ones

In the world of cybercrime, the tactics used by threat actors are constantly evolving, but upon close analysis of multiple instances, the modus operandi remains the same –  i.e. exploitation of current events, trending news, government websites, and even legitimate applications of trusted organizations to dupe unsuspecting users. By using the names and logos of […]

Proactive Measures to Safeguard against the Ransomware Menace

  Ransomware is a sophisticated malware that infects computing devices and holds the data hostage intending to extort money from its victims. Ransomware uses encryption techniques that render the victim’s data unusable. Ransomware attacks have evolved with time, and the encryption techniques to harm victims have also become sophisticated, which are often challenging to break. […]

Are Malware operators using NSIS Installers to bombard Stealers and avoid detection?

  Threat actors have been using new techniques to hide their codes and avoid detection in every manner. They now use a new trend through NSIS (Nullsoft Scriptable Install System), which is an open-source installer that can bundle various files together. In the past, Malware attackers have used this NSIS-based crypter to hide themselves. This […]

Beware of the Armage Ransomware – the File Destroyer!

In July last week, Quick Heal Security Labs detected a new ransomware called Armage. It appends ‘.Armage’ extension to files it encrypts. Armage ransomware uses the AES-256 encryption algorithm to encode files making them inoperable. It spreads via spam emails and corrupted text files. Technical analysis Once executed on the infected computer, Armage ransomware opens […]

5 Reasons Why You Should Not Unsubscribe from Spam Emails

Do you receive a lot of unwanted and advertisement-filled emails in your inbox on a regular basis? If so, then you are certainly not alone as there are several people who receive plenty of such emails on a daily basis. Hackers and attackers usually receive email addresses in bulk from their sources or even send […]

Security news and updates from the last week

India – Where most of the world’s spam originates from A large amount of email spam originates in India. This interesting report shows that most of the world’s spam actually originates in India. Facebook has more than 50 million duplicate user accounts worldwide Facebook officials have claimed that there are currently 50 million duplicate accounts […]

Season’s greetings: Beware of security threats and fake phishing pages

The festive season brings with it heart warming wishes and some great online deals for shoppers and discount seekers. Online retailers present some great discounts and add-ons at this time of the year and online sales see a massive surge in activity as a result. Unsurprisingly, attackers and phishers use this jubilant opportunity to trick […]

Simple security tips to avoid Twitter phishing scams

Twitter is a great platform for sharing news, opinions and links. Created in 2006, Twitter has more than 500 million active users today and generates more than 350 million tweets every single day. This has naturally led to several phishing attacks over the microblogging platform. The fact that links are instantly published on a large […]

Security news updates from the last week

This week was a rather busy one in the security industry. Here are some of the notable highlights that you should not miss out on. Authorized email monitoring increases by 36% in September 2012 According to reports, email monitoring by national security agencies has jumped by 36% in September 2012. However, this does not imply […]