Cross Site Scripting: Let It Not Snoop Over Your Browser
What is cross-site scripting? Cross-site scripting or XSS attack is very common and unfortunately most of us do not realize. There are different types of XSS attacks available...
Cracking: How to Safeguard Your System From it
While there’s only a fine line that divides Cracking and Hacking, the former is far more devastating than the latter. Hacking can be done with both good and...
Top 10 Malware Myths and Facts (2024 Updated Guide)
We are always surrounded by modern technology, it is changing the way we use to do things. More and more devices are getting connected and instigating risk to...
34 Interesting Facts About Computer Virus
The term ‘Computer virus’ is certainly not new to our ears. It is like a vicious flu that we all want to avoid. Computer virus have been around since...
Zyklon Malware -Exploits Microsoft Office Vulnerabilities Again
Zyklon, an HTTP botnet malware revamped after 2016 by exploiting the vulnerabilities present in Microsoft Office. Security researchers at FireEye reported that a malware named Zyklon, capable of...
OSX MaMi: An Undetectable Mac Malware
Security researcher Patrick Wardle has detected a new threat designed specifically for Mac machines. A threat that alters DNS settings and steals user data. An example of which...
Computer Worm: The Most Common Malware
Computer worm is a type of malware and is the most common in the category. A Computer worm replicates itself in order to spread on to different computers....
All You Need To Know About: Scareware
We know what malware is and how to protect yourself against them. If you are not familiar, click here to read our article about malware. But as awareness...
Difference Between Virus, Worm and Trojan Horse
Often people mix terms like worms, trojan, spyware, they use them whenever there is a discussion on computer virus. But let me tell you using them interchangeably is...
Malicious and Dangerous Computer Viruses You Cannot Overlook
Ever witnessed a virus attack on your machine? If not then you must be interested to know about them and how they work. These threats a.k.a. computer viruses...
Trojan horse! Take Prevention
Trojan horse is a type of malware which poses as a legitimate software or is attached on a genuine software or file and infects the system. It can...
All About Malware
Malware is a type of program which is used to perform malicious activity. Malware is a combination of two words Malicious and Software. It is short form of...