The term man-in-the-middle attack (MITM) – in cryptography and computer security – refers to the kind of attack where the attacker is in the middle of two communicating parties. The two parties are unaware of the presence of the middleman. So, this middleman acts…
What is and How to Remove Spyware?
May 8, 2020
The term “spyware” is defined by a kind of malicious program that’s meant for spying on the target system.We’ll have a closer look at what is spyware and how can we remove it.
Typically, spyware infiltrates a system to steal the Internet usage data…
What is a Trojan horse? How does it work?
May 7, 2020
Named after the mythical Trojan horse (which was designed by the Greeks to ambush attack the citizens of Troy), Trojans are a kind of malware that gain full control over your system in order to damage, disrupt, steal, or harm the system or network.
Though they masquerade…
Similar to phishing, pharming is a form of cybercrime in which a website’s traffic is manipulated to steal confidential information. This concept arises from two words “phishing” and “farming.” So, how can I protect myself from a pharming attack?
Basically…
Historically, rootkits were tools that provided admin-level access to a system or network. The term rootkit is a combination of two independent words “root” and “kit.” The word root referred to the admin account whereas the word kit referred to the software…
A network sniffer is a software that is programmed to monitor data flowing over a network. The scope of these tools is to monitor data, analyze the network traffic, detect bottlenecks and other problems so that the network manager can keep the flow of the traffic smooth and…
What Is And How To Avoid Social Engineering?
May 4, 2020
Social engineering is a term used to describe the act of tricking people into revealing private information or directing them subtly to take some action through the use of technology. It is a shrewd method to take advantage of the innocent human nature to exploit people. How…
Keylogger is a brief definition for the concept and practice of digital surveillance. Alternatively, it is also known as keystroke logger and is a form of spyware. Let’s look into some measures of protection against keyloggers.
Keyloggers keep track of all your clicks…
What is Spoofing? How does it work?
April 30, 2020
The term spoofing, in cybersecurity, means some kind of impersonation attempt made by cybercriminals pretending to be a name or personality that is easily trusted by the victims. This way, targets willingly reveal confidential information to the scammers.
The scammers…
The importance of fact-checking
April 29, 2020
Daniel Kahneman, a notable psychologist and winner of the 2002 Nobel Memorial Prize in Economic Sciences introduced the concept of “WYSIATI.” It means “What you see is all there is.” Fact-checking is the process of investigating an issue to verify the facts…