Category: Online Threats

Koobface is Back!

Koobface is Back!

Well, well, well… “IT” IS BACK! And by “IT” I mean Koobface. Recently, McAfee released its Threat Report: First Quarter 2013. The Report shows a steady growth in mobile malware; increase in general malware (including Koobface) and spam. Koobface is coming back with vengeance! According to McAfee Labs, there were almost three times as many […]

The Biggest Warning Signs of Emails that May Want to Steal Your Identity

The Biggest Warning Signs of Emails that May Want to Steal Your Identity

  What are the Biggest Warning Signs of Emails that May Want to Steal Your Identity? Internet phishing is a growing threat for billions of email users daily.  It seems like there is always a web scammer trying to access your information every time you read an email. The reality is that it’s incredibly simple […]

What is Keylogger?

What is Keylogger?

What is Keylogger? A Keylogger is a software program or a hardware device created to capture every keystroke that the user makes. A Keylogger is a malware, which belongs in the spyware family. A Keylogger logs every single website you visit, every email you send and receive, every document you create, etc. Basically, a Keylogger […]

What is Adware?

What is Adware?

Adware is a software program created to serve advertisements.  Usually, you get Adware on your computer by downloading some sort of free software, or freeware. It is a little tricky, because the users give their consent to download Adware.  And, since we never read what we are consenting to in the Terms of Use and […]

Ransomware: Reveton and the FBI

Ransomware: Reveton and the FBI

Last week, the FBI made a public announcement that there is a new “drive by” malware in the wild using the FBI name and a demand for a payment of the “fine”. The IC3 (The Internet Crime Complaint Center) has been aware of this malware since May and is flooded by complaints about it. This […]

What is Spyware?

What is Spyware?

Spyware is a program, which belongs in the malware category, created to monitor users’ online activities, gather personal information, login information and capture every single keystroke that the users make without their knowledge. Some Spyware is pretty harmless and useful even, but most Spyware programs are very harmful and may lead to Identity theft. What […]

What is Phishing?

What is Phishing?

Phishing is automated Identity Theft on steroids. This is the best way I can describe it. Phishing is an attempt to obtain victims’ personal information such as user names, passwords, credit card numbers, bank account numbers, PINs, Social Security Numbers and other extremely sensitive information. The word Phishing has a similar meaning as Fishing, except, […]

What is Malware?

What is Malware?

Malware is short for “malicious software” and is used as a general term to refer to any program, software, code that is designed to harm computers/computer users; hence, viruses, worms, spyware, Trojan Horses, etc. Malware is installed on the computer without its user’s knowledge by clicking on malicious links, downloading email attachments, visiting a malicious […]

What You Need To Know About Cookies

What You Need To Know About Cookies

What is Cookie? And I am not talking about the chocolate chip kind… We’ve all heard this term before.    But what is cookie when it comes to computing? A Cookie, aka browser cookie and HTTP cookie, is simply a piece of text sent to your browser by the websites you visit.  When you visit a […]

How Spammers Get Your Email Address

How Spammers Get Your Email Address

The other day, probably just like you, I received the “Uniform Traffic Ticket” email.  Of course, I knew it was malicious and I never opened the attachment.   But I started wondering: How did the spammers get my email address in the place? Have YOU ever noticed that as soon as you create a new email […]

"Phishing" at its finest.  Not.

“Phishing” at its finest. Not.

As I was checking my emails today, I opened an email from “Karen Mullins” with a subject line “Mystery Shoppers Needed”. I knew it was spam with a “phishing” attempt, but for some reason the email was not filtered as spam. No spam filtering system is perfect; therefore, I am not going to dwell on […]

Computer Viruses vs. Computer Worms

Computer Viruses vs. Computer Worms

Computer viruses and computer worms have one goal in mind:  to affect a computer user one way or another.  They are very similar, but so different at the same time.  There are two major differences between the two:  the ability to be a standalone program and the ability to travel alone. Viruses attach themselves to […]

Page 1 of 212