Also known as a CEO attack, the Whaling attack belongs to the family of phishing scams and is designed to…
A UDP Flood attack is a form of DoS attack (Denial of Service attack) where a massive number of UDP…
What is riskware? Riskware is a combination of “risk” and “software” and is defined as the category of legitimate programs…
Let's try to have a better understanging of a proxy trojan and how can we stay safe. Let’s first begin…
An Overwrite Virus is a malicious piece of computer virus which aims at destroying the original program code. It overwrites…
Spear Phishing attack belongs to the family of email-based cyber-attacks. It is categorized as a highly personalized attack and usually…
Prevent intellectual property theft: copyrights, trademark, trade secrets, employee know-how, patent rights, and other confidential information. In addition to the…
System vulnerabilities provide a ready platform to cyber criminals to target organizational and home PCs. Since cyber crime is increasing…
What is Scareware: Also known as a fraudware and rogue scanner software, a Scareware is malicious software that aims at…
A Hybrid attack uses the underlying strategies of both a brute force attack and dictionary attack in order to get…