Pop-up Ad Alert! Beware of Unrealistic Claims on your Smartphones

Credit to Author: Digvijay Mane| Date: Tue, 23 Jan 2024 11:05:23 +0000

What are pop-up advertisements? How can these pop-up ads infect your phone? What danger can this cause to…

The post Pop-up Ad Alert! Beware of Unrealistic Claims on your Smartphones appeared first on Quick Heal Blog.

Read more

Beware: Fake Apps posing as Open AI’s ChatGPT App

Credit to Author: Akshay Singla| Date: Tue, 26 Dec 2023 12:18:42 +0000

Beware!  Behind the face of advancing technology lies a dark underbelly – that of evolving cyber crime. Here,…

The post Beware: Fake Apps posing as Open AI’s ChatGPT App appeared first on Quick Heal Blog.

Read more

Battling the Death Trap of Malicious Loan Apps

Credit to Author: Digvijay Mane| Date: Wed, 30 Aug 2023 04:57:42 +0000

In the age of instant finance at our fingertips, loan apps have reshaped how we access funds. But…

The post Battling the Death Trap of Malicious Loan Apps appeared first on Quick Heal Blog.

Read more

BEWARE: Fake Applications are Disguised as Legitimate Ones

Credit to Author: Akshay Singla| Date: Mon, 08 May 2023 11:28:38 +0000

In the world of cybercrime, the tactics used by threat actors are constantly evolving, but upon close analysis…

The post BEWARE: Fake Applications are Disguised as Legitimate Ones appeared first on Quick Heal Blog.

Read more

Quick Heal reports 29 malicious apps with 10 million+ downloads on Google Play Store

Credit to Author: Digvijay Mane| Date: Tue, 24 Sep 2019 14:44:54 +0000

Quick Heal Security Labs reported 29 malicious apps found on Google Play Store, which have a collective download count of more than 10 Millions. Google was quick enough to remove these malicious apps from Play Store immediately. One of the Apps from this set, named “Multiapp multiple accounts simultaneously” has crossed 5 million…

Read more

Ransomware As A Tool – LockerGoga

Credit to Author: Ghanshyam More| Date: Wed, 03 Jul 2019 07:18:00 +0000

Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a sophisticated one. The Ransomware as a Tool has evolved in wild…

Read more