Posts under Malware tag.

Simseer identifies new Malware Strains by their Heritage

On many occasions, malware evades detection by scanning engines, and escape unscathed by undergoing a change in its structure and behavior. However, this one attribute (when present in large volumes) can be used to determinerelationship between different types of malware and detect […]

image not found

Malware Removal Guide & Tools for Beginners

Windows being the most popular OS in the world, malware writers want to target it. As a result, a lot of malware and malicious software are written for it. This makes people wrongly comment that Windows is not secure; when the fact is […]

Internet Terrorism – Definition, Methods And Examples

If you thought the only form of terrorism is the one daily shown on our television sets where they show blood, you are wrong. There is much more to terrorism used by militant and terrorist outfits as well as people […]

Malwarelympics: Infographic on Malware Hall of Shame

Like most security companies world-wide, Emsisoft too has been monitoring and analyzing the spread of malware. Their findings have now been put together nicely in this informative Infographic,  which is sure to interest any computer user. Said Christian Mairoll, CEO […]

Analyze Suspicious Behaviour of a File With FileType ID

In the online world, sometimes you hardly have control over your actions. What do I mean by this? Consider a case where you receive an email with a file attached, complete with viruses or some other kind of malware. What do […]

How To Avoid Phishing Scams And Attacks

Phishing Scams are those which fool you into giving out personal information by using emails, etc. We have already seen what is Phishing. In this article, I will give some tips on how to avoid Phishing attacks and scams. Avoid […]

image not found

What is Rootkit? How do Rootkits work? Rootkits explained.

While it is possible to hide malware in a way that will fool even the traditional antivirus/antispyware products, most malware programs are already using rootkits to hide deep on your Windows PC … and they are getting more dangerous! The DL3 […]

Can we really trust Norton PC Checkup Tool !?

I was pretty excited when I came across this application tool from Symantec – the Norton PC Checkup. It is a free tool that scans for computer problems and notifies you of the same, if any are found. Specifically, the […]

Microsoft releases whitepaper on Malware Research and Response

Malware (malicious software), as we all know, is software that has been designed to damage a user’s computer, a server, or a network; or to cause harm to computer users by stealing personal or otherwise sensitive information, defrauding the user […]

What is a Botnet attack and how does it work on a computer

Botnets are networks of compromised computers, controlled by remote attackers in order to perform such illicit tasks as sending spam or attacking other computers. The word Bot comes from the word Robot and is referred to any software program that […]