454 articles

Hot summer of 2012

In addition to the above examples, there were two other large scale and highly scandalous invasions in July and August of last year. The victims were users of the popular

How to Fight Rootkits

Security professionals and enthusiasts are aware of rootkits, but general audiences typically don’t know about this kind of malware, which is specifically designed to hide itself and its activity in

exploit_title

What is an Exploit?

If Achilles’s heel was his vulnerability in the Iliad, then Paris’s poison tipped arrow was the exploit. Quite literally, an exploit is the device or – more often than not

botnet

What is a Botnet?

Botnets are large networks of PCs infected with a specific kind of malware. Learn more on how to protect your devices from this type of malware.