Attackers use all kinds of attack vectors to steal sensitive information from their targets. Their efforts are not limited to only zero-day vulnerabilities. Malware authors often exploit old vulnerabilities because a large number of organizations still use old vulnerable software. The Trojan Travnet, which steals information, is a classic example of malware that takes advantage Read more…
Isn’t Christmas and the school holidays a whirlwind? Between holiday ‘catch-ups’, the very intense family schedule and New Year’s celebrations, it can be a wonderful yet often exhausting time. Sometime it is hard to find a moment to think! But now school has begun and the dust has settled. Phew! So, I have to ask Read more…
The Lady has just turned 30. But she isn’t ready to leave the limelight yet, for she is still evolving, still acquiring large number of admirers daily. No wonder that over 2.4 billion people across the world are her diehard users today, according to Internet World statistics. Wondering who she is? She is the wonder Read more…
Wait…what! You heard it right: According to a recent security report, Internet users are 182 times more likely to get a virus from clicking on online ads than visiting an adult website. At first glance, this sounds extremely counterintuitive (and it is). In theory, wouldn’t your risk go up when visiting shady sites? Yes and Read more…
One of the most prevalent families of recent Trojans is called fake alerts. These Trojans generate fake warning screens that look like they were generated by legitimate security or anti-malware software. The majority of malware within this family attempts to con users by convincing them that their systems are at risk and that they should purchase Read more…