A newly detected malware known as ThiefQuest Malware is targeting Mac devices worldwide. It belongs to the family of ransomware and is capable of stealing credit card details along with other confidential information and passwords.
The first Mac-specific ransomware was…
What Are Malware Bots and How to Get Rid of Them
July 24, 2020
A bot is an automated program designed to perform a specific task. Bots are also referred to as crawlers, spiders, and web-bots. Malware bots are used by cybercriminals to perform repetitive tasks and aim at getting full system control.
There can be both good and bad…
What is Dropper Malware: Protection and Prevention
July 23, 2020
Dropper malware are malicious programs that are designed to secretly carry harmful programs built into their codes on a machine. They usually carry backdoors, infected software, and viruses and targets vulnerable and compromised systems.
Individually, droppers are not…
What is a Logic Bomb? Detection and protection
July 21, 2020
Logic bomb protection: A Logic Bomb is an event-based malicious code used by hackers to infect worldwide PCs. In this, an infected code is inserted into your computer device, network spectrum, and its operating system which gets executed at a particular event.
The…
Virus detection and prevention: a File Infecting virus is designed to infect the files stored on your computer system and can cause significant damage to your data.
The files with .EXE and .COM extension are its main targets, however, the virus is also capable of…
A Boot sector virus infects the hard disk or the Master Boot Record of your computer system and executes itself when you boot your device. It gets loaded on your device memory and keeps infecting the floppy disks which you run on the infected device.
A Boot Sector Virus…
What is the Polymorphic Virus and How to Prevent it?
July 14, 2020
A polymorphic virus is a highly flexible and deadly virus that repeatedly changes and replicates itself to avoid detection. It is a great threat to your computer system and personal information stored on it and can easily change its characteristics to adapt to the security…
Active and Passive Attacks: Differences and prevention
July 10, 2020
While Active and Passive attacks both belong to the family of security attacks there are few underlying points that differentiate them.
Before moving on to the differential factors let’s quickly get a brief understanding of each one of them.
What is an Active…
A Replay Attack is categorized as a network-based security hack and it is built on interception and re-transmission of data. Its main aim is to get system access along with the data stored and transmitted from it.
What Do You Mean By A Replay Attack?
A Replay attack…
A TCP SYN Flood attack is categorized as DoS (Denial of Service attack). It is undeniably one of the oldest yet the most popular DoS attacks that aim at making the targeted server unresponsive by sending multiple SYN packets.
During the attack, the TCP connections are…