Posts under Malware tag.

types of cybercrime

Types of Cybercrime Acts and Preventive Measures

In our last article on Cyber Crime, we saw what cybercrime is and how one could take certain basic steps to prevent it from happening to you. Today we will go a bit more in detail and see the types of […]

cybercrime

What is Cyber Crime? How to deal with it?

Any crime committed by means of or by using a computer and an internet connection or computer technology is known as Cyber Crime. There is not just a single aspect to the definition of cyber crime. The crime can be […]

What is Badware

What is Badware? Is your Website infected?

The term malware brackets all possible malicious software – Worms, virus, spyware, etc. Badware, although it my look as if it could be used interchangeably with malware, is different, as it is reserved for a certain set of malware, that […]

what is malvertising

What is Malvertising? How to Avoid it?

There are many methods being used to compromise users of the Internet, so that their information can be obtained by cyber-criminals. Once a computer is compromised, the cyber-criminals can use the users data for anything they want. Such events may […]

Evolution of Malware and Viruses

Evolution of Malware – How it all began!

Hi. I am Creeper. Catch me if you can. It was the ’50s! Back then, computers were big. Programmers used punching cards. One such programmer – Bob Thomas – experimented with self-replicating programs and created the Creeper. Fortunately, the worm […]

Know if your Windows Security Center is a virus or legitimate

Windows Security Center is a component of the Windows operating system, that was introduced by Microsoft in Windows XP and included in Windows Vista too. The program helped you keep a check on your system, by monitoring regularly the status […]

CryptoDefense Ransomware and how Symantec helped it fix its flaw!

CryptoDefense ransomware is dominating discussions these days. Victims falling prey to this variant of Ransomware have been turning to different forums in large numbers, seeking support from experts. Considered as a type of ransomware, the program apes the behavior of […]

Remote Administration Tools – Emerging Threats

We are not talking about the rodents. RAT stands for Remote Administration Tools. While the intentions behind creating such tools was to offer remote support, they are now being increasingly used to spy on others, as well as to control […]

What are Drive-by downloads? Prevent Drive-by download attacks!

What are Drive-by downloads? Drive-by download attacks occur when vulnerable computers get infected by just visiting a website. Findings from latest Microsoft Security Intelligence Report and many of its previous volumes reveal that Drive-by Exploits have become the top web security […]

Biggest Malware & Online Threats

The year saw many types of internet threats being active, and the most popular ones were, Drive-by exploits, SMS scams, Ransomware and Phishing mails. Gone are the good old days where a virus just played pranks or caused minor damages. […]

How to prevent Stealth Attacks on the Internet

To begin with, I am not an expert on the subject. I came across a whitepaper from McAfee that explained what a stealth attack is as well as how to counter them. This post is based on what I could […]

Simseer identifies new Malware Strains by their Heritage

On many occasions, malware evades detection by scanning engines, and escape unscathed by undergoing a change in its structure and behavior. However, this one attribute (when present in large volumes) can be used to determinerelationship between different types of malware and detect […]

image not found

Malware Removal Guide & Tools for Beginners

Windows being the most popular OS in the world, malware writers want to target it. As a result, a lot of malware and malicious software are written for it. This makes people wrongly comment that Windows is not secure; when the fact is […]

Internet Terrorism – Definition, Methods And Examples

If you thought the only form of terrorism is the one daily shown on our television sets where they show blood, you are wrong. There is much more to terrorism used by militant and terrorist outfits as well as people […]

Malwarelympics: Infographic on Malware Hall of Shame

Like most security companies world-wide, Emsisoft too has been monitoring and analyzing the spread of malware. Their findings have now been put together nicely in this informative Infographic,  which is sure to interest any computer user. Said Christian Mairoll, CEO […]