Wednesday, April 26, 2017
united states computer emergency readiness team

Dangers of Trojan Infections

The code of a trojan infection may – or may not – take effect immediately. The main purpose of a trojan is to infiltrate an operating system through misleading a user...
online password

How to Strengthen Your Online Passwords

In Ancient Egypt, Words had Power. Names were the most important, potent words of all. At the end of Life, to pass beyond the water and enter the Afterlife it was...
email protection

3 Ways To Protect Your E-mail Address From Spammers

Now, spam is not just a pain in the proverbial processor – it's a real live and kicking threat. Apart from having to constantly clean up the garbage, one careless click...

How to Prevent Ransomware: 21 Tips and Tricks

Nowadays ransomware prevention is very important thing to know. Having in mind that submitting the ransom might be the only option for recovering data, users should learn some tricks to keep...
heuristic algo

How Anti-virus Heuristic Detection Works

Metamorphic coding of a virus will not automatically protect against detection by heuristic analysis, though in some cases it is enough to prevent discovery by these methods. Where polymorphic code is...
mobile ransomware

Ransomware Goes Mobile

Ransomware is the fastest growing threat online today, raising many millions each year (and not for charity). After infiltrating a system, it encrypts or locks files and demands a ransom be...
ransomware evolution

Ransomware Evolution: Then and Now

Many centuries ago, humans learned to ride on the backs of animals to make travel faster, more efficient (especially with loads). After this the connection was made that a rock or...

The Use of Hashes in Signature-based Malware Detection

A hash is a fingerprint of a file that is unique for every file. It is almost impossible to compromise an operating system without changing a system file - and with...
webcam

Why You Should Disable Your Webcam

This subject was once considered paranoia, though events have proven that it is possible to spy on a user by hijacking a webcam. Of course, if there is hardware attached to...

The Evasion Techniques of the Zeus Trojan

The most impressive of the escape and evasion techniques employed by the Zeus trojan is its use of a stolen Digital Certificate. Every P.C running a Windows operating system is set...