Types of Cybercrime Acts and Preventive Measures
In our last article on Cyber Crime, we saw what cybercrime is and how one could take certain basic steps to prevent it from happening to you. Today we will go a bit more in detail and see the types of...
View ArticleCyber Attacks – Definition, Types, Prevention
A Cyber Attack is an attack initiated from a computer against another computer or a website, with a view to compromising the integrity, confidentiality or availability of target and the information...
View ArticlePotentially Unwanted Programs and how to avoid installing PUPs
In this post, we will see what are Potentially Unwanted Programs, also called in short as PUPs, and how you can detect them, stop them from installing and remove them – if third-party software install...
View ArticleBundleware: Definition, Prevention, Removal Guide
What does Bundleware mean? Bundleware got its name from people ‘bundling’ different programs into one single installation program. The one installation for bundleware installs the main program that...
View ArticleWhat is Macro Virus or Macro Targeted Malware? How to stay safe?
There have been many types of malware, ever since the dawn of computers. While initially it was for fun, back in the days of QDOS, malware creating and distribution is now a full-time business, with...
View ArticleHow to uninstall and remove Superfish malware completely
The Superfish malware has been in news recently, with Lenovo pre-installing it on all their new computers. This post shows how to find out if your Lenovo computer has Superfish malware installed and...
View ArticleDLL Hijacking Vulnerability Attacks, Prevention & Detection
DLL stands for Dynamic Link Libraries and are external parts of applications that run on Windows or any other operating systems. Most applications are not complete in themselves and store code in...
View ArticleWhat is Socially Engineered Malware? Precautions to take.
This post take a look at the definition & examples of Socially Engineered Malware or SEM and the tactics employed by fraudsters to push malware. It also lists some basic precautions web surfers...
View ArticleHow to remove Searchguide Level 3 Browser Hijacker
Searchguide Level 3 is a browser hijacker which hijacks your web browser and changes all your settings including the default search engine to searchguide.level3.com without any permission. Being an...
View ArticleBeware of such Unwanted Software that give out false claims, says Microsoft
There are many software programs being offered these days, that identify themselves as Malware removers and PC Optimizers, and promise to effectively identify errors, clean up the disk and make the...
View ArticlePrevent and block Macros from running in Microsoft Office using Group Policy
You can block Macros and consequently Macro virus or Macro targeted malware files, from the Internet, from opening & running automatically in your Microsoft Office 2016 programs like Word, Excel or...
View ArticleHow to remove Macro Virus from Word or Excel
A Macro Virus is a malware that can infect any software written with a macro language notable among which are the Microsoft Office programs like Word and Excel. Macro Virus takes advantage of Macros...
View ArticleTrojan Attacks are on the rise! How do Trojans work?
In the recently published edition of Security Intelligence Report (SIR), the company found out that attackers used Trojans more than any other malware on Microsoft services. Cyber threats are on the...
View ArticleHow can you get a computer virus or malware?
How can your computer get a virus, trojan, work or spyware? What are the ways malware can infect your Windows computer? What types of files carry virus and malware? We will touch upon these questions...
View ArticleHow to prepare for and deal with a DDoS attack
Last week, the United States woke up to a massive DDoS attack that took down almost half of the major sites in the country. Big websites like Twitter, Reddit and Amazon were badly affected and users...
View ArticleHow to remove Tavanero Search from Chrome, Firefox IE on Windows PC
If you notice that the search engine and home page has changed and you see a new ‘Search’ page with each alphabet in different colors, it is likely that your browser has been hijacked by Tavanero...
View ArticleHow to remove Chromium malware from Windows 10
These Chromium malware removal instruction will help you uninstall & remove Chromium virus & rogue Chromium based browsers from your Windows computer. Actually, Chromium is a legitimate...
View ArticleWhat is Remote Access Trojan? Prevention, Detection & Removal discussed
Remote Access Trojans (RAT) have always proved to be a big risk to this world when it comes to hijacking a computer or just playing a prank with a friend. A RAT is a malicious software that lets the...
View ArticleWhat is Retefe Banking Trojan? Eset Retefe Checker will help remove this malware
Another day another malware, that seems to be the new order, literally every day we are coming across a new species of malware that is capable of creating havoc but the good thing is security research...
View ArticleRemote Code Execution attacks and Prevention steps
Remote Code Execution or RCE has been one of the most preferred methods by hackers to infiltrate into a network/machines. In simple words, Remote Code Execution occurs when an attacker exploits a bug...
View Article