448 articles

How to Fight Rootkits

Security professionals and enthusiasts are aware of rootkits, but general audiences typically don’t know about this kind of malware, which is specifically designed to hide itself and its activity in

exploit_title

What is an Exploit?

If Achilles’s heel was his vulnerability in the Iliad, then Paris’s poison tipped arrow was the exploit. Quite literally, an exploit is the device or – more often than not

botnet

What is a Botnet?

Botnets are large networks of PCs infected with a specific kind of malware. Learn more on how to protect your devices from this type of malware.

Beware of Webcams!

Attackers trying to infect your computer with malware capable of remote access don’t necessarily seek money; some cybercriminals are just having fun. The most valuable items to these invaders are

Preventing Pop-Ups

Pop-up ads aren’t the massive problem they once were, but they’re still a nuisance. And because most reputable sites now steer clear of them, a lot of the pop-ups that