Looking back at 2017… Bitcoin- the term is familiar now even to the not-so-tech-savvy layman; the internet is so full of success stories of people who have made their fortune by trading in Bitcoin. Rapper 50 Cent (whose real name…
It was the first time that German’s AV-Test had tested Google Play, and showed how it results proved to be a disappointment. This only proved the theory that Google play had to use third-party AV solution to protect their Android…
Traditional antivirus programs detect malicious codes by cross-checking with the database of virus definition that they have. The antivirus programs try to find out if there is a match. Every day, as new and new malware are being created, the…
This article shows everything you wanted to know about the best antivirus available in the market. Why you need antivirus for windows? Unless you’ve security software installed, your PC or laptop is vulnerable to malware and ransomware. The latter is…
We have seen how most of the virus is Windows-centric, and that malicious program intended for Windows cannot harm a Mac. It’s true to an extent but now the trend has changed. The cyber criminals are smart and it’s like…
A backdoor is a malicious computer program used to provide the attacker with unauthorized remote access to a compromised PC by exploiting security vulnerabilities. This backdoor virus works in the background and hides from the user. It is quite difficult…
Code red is a computer worm that was identified in July 2001, when computers running on Internet Information Services (IIS) web server of Microsoft were found compromised. The after effect of the attack caused a damage of billions of dollars…
Computer Virus Similar to the virus which affects the human body, a computer virus is a malicious program that affects the computer to choke or bring down the normal functioning. Usually, a computer virus self-replicates by copying itself to…
Locky is one kind of latest ransomware. It was first released in 2016. The IT security geeks had discovered that the malware authors send ransomware infected emails demanding for payment through an invoice in the form of malicious Microsoft Word…
The wannacry ransomware is composed of various components Files with encryption keys Application to encrypt data Application to decrypt data A copy of Tor Browser Unlike other ransomware, wannacry has taken the internet world by storm as it created a…