Malware

Botnet an Emerging Threat

Botnet an Emerging Threat

Cyber criminals use a combination of many computers to commit cybercrimes. They take control of different devices and when in need they order them to ...

How Terdot Trojan Has Turned Itself Into A Monster

How Terdot Trojan Has Turned Itself Into A Monster

Terdot trojan, the banking malware was firstly noticed in October 2016. Since then, the malware has grown into a monster that is no longer just a bank...

Fileless Malware on the Rise

Fileless Malware on the Rise

Fileless malware are responsible for 15% of worldwide known cyberattacks today. 140 banks, telecoms and governments are affected by it. The malware ha...

The Evil Trinity: Vulnerabilities, Exploits, and Threats

The Evil Trinity: Vulnerabilities, Exploits, and Threats

With the changing environment everything is becoming complex than ever. With more and more devices getting connected via internet , hackers have more ...

How To Remove PUP From Mac

How To Remove PUP From Mac

We all love Mac OS for its security features, but do you know that Mac OS is susceptible to potentially unwanted programs (PUP)? These programs displa...