It Security and Information



A man-in-the-middle-attack (MITM) is a term used when a malicious actor positions themselves in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of…

Posted on


Phishing is a malware that is actively aiming to steal login credentials and other sensitive data by sending unsolicited email. See software to stop phising.

Posted on


Spam is a tactic for selling goods and services by sending unsolicited emails to bulk lists. Software to solve Spam.

Posted on


Spyware describes software with malicious behavior that aims to gather information about a person or organization and send such information to another entity in a way that harms the user. See software to stop spyware

Posted on


Ransomware is malware that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. This class of malware can be installed through deceptive links in an email message, instant message…

Posted on

Trojan horse

a Trojan horse is any malware which misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy. A trojan horse…

Posted on


A botnet is a collection of internet-connected devices infected by malware that allow hackers to control them. See software to stop botnets.

Posted on


A computer virus is a type of malware that replicates itself by modifying other computer programs and inserting its own code. Types of common computer viruses: Resident Virus Multipartite Virus Direct Action Browser Hijacker Overwrite Virus Web Scripting Virus File…

Posted on


A worm is a type of malware that replicates itself to spread it’s malicious attack to other computers. Malware will rely on security failures of the targeted computer to access it. It will use this machine as a host to…

Posted on