Once again, it’s that time of the year, to swear avoiding junk foods, sweets and keep in shape. To learn new arts, and promise yourself with a resolution that this year you are going to pursue your passion and stick…
Traditional antivirus programs detect malicious codes by cross-checking with the database of virus definition that they have. The antivirus programs try to find out if there is a match. Every day, as new and new malware are being created, the…
Computer security, we all know, is of paramount importance these days, whether it be a personal computer, used solely for personal purposes or one used for official or business purposes. Every computer needs to be kept secure, especially since much…
This article shows everything you wanted to know about the best antivirus available in the market. Why you need antivirus for windows? Unless you’ve security software installed, your PC or laptop is vulnerable to malware and ransomware. The latter is…
We have seen how most of the virus is Windows-centric, and that malicious program intended for Windows cannot harm a Mac. It’s true to an extent but now the trend has changed. The cyber criminals are smart and it’s like…
A backdoor is a malicious computer program used to provide the attacker with unauthorized remote access to a compromised PC by exploiting security vulnerabilities. This backdoor virus works in the background and hides from the user. It is quite difficult…
Code red is a computer worm that was identified in July 2001, when computers running on Internet Information Services (IIS) web server of Microsoft were found compromised. The after effect of the attack caused a damage of billions of dollars…
Computer Virus Similar to the virus which affects the human body, a computer virus is a malicious program that affects the computer to choke or bring down the normal functioning. Usually, a computer virus self-replicates by copying itself to…
Locky is one kind of latest ransomware. It was first released in 2016. The IT security geeks had discovered that the malware authors send ransomware infected emails demanding for payment through an invoice in the form of malicious Microsoft Word…
The wannacry ransomware is composed of various components Files with encryption keys Application to encrypt data Application to decrypt data A copy of Tor Browser Unlike other ransomware, wannacry has taken the internet world by storm as it created a…