RootKits

RootKits | What Are They? Rootkits are programs that are used to hide the fact that a systemโ€™s security has been compromised. Rootkits must be inserted manually by an attacker…

Read More

Adware

Adware | What is Adware? Adware are applications that automatically play, display or download advertisements to a computer. These are also known as Advertisement-supported software. The advertisements may be displayed…

Read More

Trojans

Trojans | What Are They? Trojans, also known by the name Trojan Horses, are malicious software applications which appear to be performing a desired action for the user while in…

Read More

Vishing

What is Vishing? Vishing is widely known to be a criminal practice used in various social engineering activities in order to gather private information from the general public while engaged…

Read More

Spam

What is Spam? Spamming (or spam) is the process of sending unsolicited email, most of the times with commercial purposes, practiced mostly alongside illegal electronic marketing practices by pornographic website…

Read More

Pharming

What is Pharming? Pharming is a digital attack method used by malicious Internet users in order to redirect the traffic of a legitimate website towards a misleading one with the…

Read More

Botnets

What are Botnets? Botnets are networks of interconnected, autonomous and automatically infected computers used to carry out malicious digital activities such as denial of service attacks, spam or even further…

Read More