The Zeus malware, also known as the ZeuS or Zbot, is a Trojan Horse used to steal confidential information from the victims’ computers. The primary ways by which Zeus malware infects a computer are through phishing attacks and drive-by downloads.…
Conficker is a computer worm developed by malware authors to infect Windows computers with the vulnerability (MS08-067) and spread the infection to other such vulnerable Windows computers connected to the network without any human intervention. It is also called Downadup.…
Koobface is a type of computer worm that infects unwary users through social media platforms like Facebook. It infects computers of unwary users in an attempt to gather sensitive information such as credit card numbers. The Koobface worm can connect…
Computer Virus Even before we try to understand what a boot sector virus is, let us understand what is a computer virus. In the online world, the term computer virus refers to a malicious program that auto-multiplies by copying itself…
Bots are Internet robots also known as crawlers, spiders, and web bots. They are automated programs developed for performing repetitive tasks. With the computing power available to programmers, bots have been developed to execute tasks at extremely high speeds, unbelievable…
The word Pharming is coined from the words “phishing” and “farming”. It refers to the cybercrime activities such as phishing, where a website’s traffic is hacked in order to steal the sensitive data. Basically, Pharming utilizes the sequence of letters…
The Morris worm was released on November 2nd, 1988 by Robert Tappan Morris. It was the first of computer worms to be distributed on the internet that would not work as planned. Origins As mentioned above, the worm virus was…
Crimeware is a set of programs or any computer program that has been designed to facilitate illegal activity online. Many spyware programs, keyloggers, and browser hijackers can be considered crimeware, although only those used illicitly. The phishing kit is one…
Browser hijacking is a kind of unwanted program that changes a browser’s settings without a user’s approval, to inject unwanted promotion into the user’s browser. A browser hijacker may substitute the actual home page, 404 pages, or search page with…
With the influence of sophisticated technology high and low, hackers and otith the new security pather bad guys from the virtual underworld find ways to infect users’ computers. Most of us are not much concerned about performing an antivirus scan…