10-1lay-2

10 Signs of a Malware Infection

Even if you follow all the Cardinal Rules of system security — you regularly update your operating system and programs, avoid spam like the plague and never click through on suspi...
rootkit

How to Fight Rootkits

Security professionals and enthusiasts are aware of rootkits, but general audiences typically don’t know about this kind of malware, which is specifically designed to hide itself ...
apt_title

What is APT?

APT stands for advanced persistent threat. It became famous following a New York Times exposé detailing a month’s long attack campaign in which a Chinese military unit now known a...
botnet

What is a Botnet?

Botnets first came into the consciousness of most of the general public in early 2000 when a Canadian teenager launched a series of distributed denial-of-service attacks against s...
Computer Attack

What is a Man-in-the-Middle Attack?

The goal of most attackers, regardless of how they go about their business, is to steal user data. That could be in small, discrete attacks on individual users or it could be in l...
spam

Five Popular Spam Scams

Everyone should know by now that there are, sadly, no members of deposed African royal families who want to share millions of dollars with you, no strings attached. What everyone ...
rootkit

What is a Rootkit?

Rootkits have been around for nearly 20 years now, allowing attackers to get access to and steal data from users’ machines without being detected for long periods of time. The ter...