What is the price of your stolen identity on the online black market?

Credit to Author: Rajiv Singha| Date: Tue, 10 Jul 2018 10:00:04 +0000

If you thought there is only a black market for stolen mobile phones, drugs, pirated software, etc., then you could be wrong. There is a black market that exists on the Internet and its most lucrative commodity is your personally identifiable information (PII – sensitive information that can be used…

Read more

3 common types of phishing attacks and tips to avoid them

Credit to Author: Rajiv Singha| Date: Tue, 26 Jun 2018 10:51:01 +0000

Phishing is one of the oldest tricks in the book of hackers. But as old as it might be, phishing still remains the most lucrative tool for cybercriminals; as they say, old is gold. This post tells you about the 3 common types of phishing attacks and tips to avoid…

Read more

Satan ransomware raises its head again!

Credit to Author: Shriram Munde| Date: Wed, 20 Jun 2018 11:08:35 +0000

Satan ransomware first occurred in early 2017. And it has resurfaced with a new variant in 2018. We have seen it using new, innovative techniques to spread such as EternalBlue exploit to distribute over compromised networks.   This variant of Satan propagates using the below techniques: Mimikatz EternalBlue – exploit…

Read more

Cryptojacking is when someone illegally uses your PC to make digital money + 8 facts

Credit to Author: Rajiv Singha| Date: Wed, 20 Jun 2018 10:51:48 +0000

What attracts more than a magnet? You might have guessed it right – it is money! And where there is easy money, there is a lot of hustle and bustle. Till now, ransomware was seen as the ultimate cash cow for attackers – kidnap critical data and ask a ransom…

Read more

Alert! Quick Heal detects banking Trojan malware seeking financial data using popular social media and banking apps

Credit to Author: Rajiv Singha| Date: Wed, 13 Jun 2018 07:27:25 +0000

Quick Heal Security Labs has detected two banking Trojan malware designed to steal financial data by using popular social and banking apps. Reading this post will help you understand how this malware works and how can you protect yourself against it. What is a banking Trojan? Banking Trojans (also known…

Read more

CVE-2018-5002 – Adobe Flash Player Stack Buffer Overflow Vulnerability Alert!

Credit to Author: Sameer Patil| Date: Fri, 08 Jun 2018 09:59:53 +0000

The recent zero-day vulnerability CVE-2018-5002 in Adobe Flash Player enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSB18-19 on June 7, 2018 to address this issue. According to Adobe, the in-wild exploit is being used in limited, targeted attacks and it…

Read more

Quick Heal detects banking Trojans imitating popular social media and banking apps in India

Credit to Author: Bajrang Mane| Date: Tue, 05 Jun 2018 13:40:33 +0000

Quick Heal Security Labs has spotted two banking Trojan malware. These malware imitate some popular social and banking apps. While doing so, they gain access to some security permissions on the infected device which allow them to steal the user’s banking credentials. The malware are able to do this by…

Read more