Here’s how you can stay safe from the Android Banking Trojan that targets banking apps

If our readers can recollect, Quick Heal Security Labs had released an important advisory about an Android banking Trojan that is known to target about 232 banking apps. As a continuation of the post, here we will help you understand how you can protect yourself from this malware by following some simple security measures. First, […]

11_tips_to_do_secure_cashless_transactions

11 Tips for Secure Cashless Transactions

In the wake of the demonetisation campaign, people are opting for cashless transactions for online banking, shopping, paying bills, booking tickets, etc. But, while this mode of payment may have brought some relief to the cash crunch in ATMs and banks, it has opened up new opportunities for cybercriminals. And you may ask why? What […]

ATM_Skimming

4 tips on how to protect yourself from ATM skimming

It so happens that a vacation taken by a cyber security expert turns out to be yet another eye-opener for many. While holidaying in Vienna, Austria, cyber security expert Benjamin Tedesco comes across a well-camouflaged ATM skimming machine. Before we continue, let us tell you a little about what is ATM skimming? For those who […]

Cyber Security Challenges and Emerging Reforms in the Indian Banking Sector

The Indian banking industry has evolved majorly in the past few years owing to technological innovations. Public and privatized banks are allotting bigger budgets towards acquiring and building IT infrastructure and have leveraged IT across all banking operations. Banks constantly face the business challenge of meeting customers’ expectations and improvising on their services and offerings. […]

The Curious Case of Upatre

What is Upatre? Upatre is a piece of malicious software that downloads and executes other malware. The name ‘Upatre’ comes from User Agent string “UPdATes downloadER” used by the malware. We have been observing Upatre infections since 2013 at the Quick Heal Threat Research lab. The curious thing here is that, attackers running Upatre campaign […]

  • 1
  • 2