Open post

Man-in-the-middle-attack

A man-in-the-middle-attack (MITM) is a term used when a malicious actor positions themselves in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway. See software to manage the Man-in-the-middle-attack  ...

Open post

Phishing

Phishing is a malware that is actively aiming to steal login credentials and other sensitive data by sending unsolicited email. See software to stop phising....

Open post

Spyware

Spyware describes software with malicious behavior that aims to gather information about a person or organization and send such information to another entity in a way that harms the user. See software to stop spyware...

Open post

Ransomeware

Ransomware is malware that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. This class of malware can be installed through deceptive links in an email message, instant message or website....

Open post

Trojan horse

a Trojan horse is any malware which misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy. A trojan horse may appear is an friendly or known email disguised to fool the recipient into...

Open post

Viruses

A computer virus is a type of malware that replicates itself by modifying other computer programs and inserting its own code. Types of common computer viruses: Resident Virus Multipartite Virus Direct Action Browser Hijacker Overwrite Virus Web Scripting Virus File Infector Network Virus See software to stop viruses....

Open post

Worms

A worm is a type of malware that replicates itself to spread it’s malicious attack to other computers. Malware will rely on security failures of the targeted computer to access it. It will use this machine as a host to latch on and infect other computers....

Scroll to top