How Antivirus Works?

Viruses are the oldest form of malicious code around, creating havoc before the days of the Internet. They come in many forms — ranging from boot sector to macro to file infectors. And each type of virus takes its own devious course when it comes to propagation and causing damage. It stands to reason, then, … Read more

List of Types of Malware

Malware is a piece of bad news wrapped up in software. That’s the long and short of it. Malicious software coded with the intent of causing harm to a user, a system, or a network is nothing new, but what’s scary is its continuing evolution into new and invisible forms of threats. To combat cyber … Read more

What is Browser Hijacker

A Browser Hijacker is an unwanted software program that takes over control of your browser without permission. Have you experienced unusual website redirects or annoying pop-up ads? Those are signs that your browser has been taken over by a hijacker. It modifies browser settings without user consent. Unwanted actions include: the insertion of ads or … Read more

What is Zero Day Attack?

When an unknown vulnerability in software is exploited, it is called a Zero Day Attack. It is sometimes referred as a Zero-Hour, 0-day or day-zero attack. Software developers release their product for end-users only after vigorous testing has been completed. But of course, the phrase “nothing is perfect” applies to software programs too. There are … Read more

Antivirus vs Anti-Malware

The rise of cyber-crime has made computer security confusing for most users. This article aims at providing clarification about the need of anti-malware by stating how it works differently from Antivirus software.

Layered Security Configuration

Layered security is a crucial element for overall security and is implemented through overlapping layers providing protection at each level. The key benefits of defense in depth strategy is that it provides measures corresponding to Protection Detection and Response In many scenarios, layered security strategy mitigates the potential weakness of one layer by the strength … Read more