What is a Fake Antivirus?

What is a Fake Antivirus?

What is a Fake Antivirus? You’re browsing the internet, perhaps doing some online shopping or looking for inspiration for your next vacation, and then an alert splashes across your screen. In big red letters, the popup informs you that A VIRUS HAS BEEN DETECTED and...
What is an APT?

What is an APT?

What is an Advanced Persistent Threat? The type of malware known as ‘Advanced Persistent Threats,’ or APTs, sounds like something out of a sci-fi action movie – reminiscent of the Terminator T-1000. And, like a futuristic movie villain, APTs are far more capable...
What is a Rootkit?

What is a Rootkit?

What is a Rootkit? When you run an antivirus scan, you expect it will detect all kinds of malware and malicious code. However, rootkits are an insidious type of computer virus that are capable of remaining undetected, sometimes for years! They can allow hackers...
What is a Man in the Middle Attack?

What is a Man in the Middle Attack?

What is a Man in the Middle Attack? Today it is easy to feel like you’re constantly being watched – surveillance cameras sit on every corner and every online service makes us sign away our privacy rights first. However, nefarious actors have gotten in on the...
What is a Computer Virus?

What is a Computer Virus?

What is a Computer Virus? In today’s digital age, the term “computer virus” is almost as well-known as the common cold, yet the term is frequently misunderstood. At their most basic, a computer virus is a type of malicious software that...
What is a Trojan Horse?

What is a Trojan Horse?

What is a Trojan Horse? Like the giant, hollow wooden horse used against the ancient city of Troy, Trojan Horse viruses sit harmlessly outside of your computer’s walls until they are invited in. Disguised as useful applications or as attachments sent by a colleague,...
What is a Malware Attack?

What is a Malware Attack?

What is a Malware Attack? Many of us live in safe neighborhoods with relatively little crime. However, we can all agree that it’s still a good idea to lock your doors when you leave home and to take some basic steps to stay safe! It may be slightly hyperbolic to...
What is a botnet?

What is a botnet?

What is a botnet? Botnet is a term that sounds straight out of a science fiction movie, but while fanciful sounding these are a very real cybersecurity threat! A botnet, in simple terms, is a network of infected computers that is controlled by a hacker without the...
How does DDOS Attack Work?

How does DDOS Attack Work?

Understanding and Preventing DDoS Attacks: A Guide for Homeowners and Small Businesses In today’s digital era, our lives are more interconnected than ever before. We rely heavily on the internet for almost every aspect of our daily lives, from smart thermostats...