What is considered the worst type of Internet Threat Today?

Viruses and Scripts that ruined your day by slowing things down or causing unwanted pop ups are the thing of the past. These malicious programs still exist and most people will get infected. However, the loss and damage that comes from these is minimal and infections are manageable. Then what is considered the worst infection today? The answer is in many parts, Phishing – Socially engineered ...
Read More

Understanding the Threat – DDoS

DDoS simply stands for Distributed Denial of Service In computing, a denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. A distributed denial-of-service (DDoS) is where the attack source is more than one, often thousands ...
Read More

Virus Removal

For years, there have been many online resources that has helped computer users to detect and remove viruses and worms. One such reliable, community backed resource is Bleeping Computers. Check out their virus removal forum. There is also a search if you are looking for a solution for a specific type or variant of infection. http://www.bleepingcomputer.com/virus-removal/ Preview:
Read More

Understanding the Threat – Malware

'Malware' is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software.   Read Full Wikipedia article here
Read More

Email Spoofing | A Serious Problem

An employee of a small manufacturing facility received an email from the CEO of the company, requesting a payment to a new vendor for some equipment. The amount requested was just under $100,000 dollars. The scammer, spoofed the CEO's email address by using a very simple technique - 'Send As'. "Send as", is a setting on any free web based emails service, which can be set to a name, such as First ...
Read More

Understanding the Threat – Phishing

Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.   Read Full Wikipedia article here  
Read More

Understanding the Threat – Smishing

In computing, SMS phishing or smishing is a form of criminal activity using social engineering techniques. Phishing is the act of attempting to acquire personal information such as passwords and details by masquerading as a trustworthy entity in an electronic communication. Short Message Service (SMS) is the technology used for text messages on cell phones.   Read Full Wikipedia article here
Read More

Understanding the Threat – Vishing

Voice phishing is the criminal practice of using social engineering over the telephone system to gain access to private personal and financial information from the public for the purpose of financial reward. Sometimes referred to as 'vishing', the word is a combination of "voice" and phishing.   Read Full Wikipedia article here
Read More
Make sure you receive Important News & Alerts on Cyber Security and Giveaways. Click here for more Information. 
Holler Box