• Home
  • Month: October 2018

Spoofing is a fraudulent practice in which a person or malicious program is disguised as a known computer/tablet/phone by cloning device information. The purpose of these attacks is to trick the recipient into allowing the transfer of

Spyware is one of the most common threats on the internet. It runs quietly in the background collecting your personal data without you even knowing it’s there.  It then sends that information over the internet to a

A Trojan Horse, or, simply, a trojan, is a kind of malware that hides within computer programs and is designed to damage, disrupt, steal, or inflict some other harmful action on your data or network. The infected

  Ransomware is a type of malware designed to encrypt, erase, or block access to files on a system, until a ransom is paid by the victim. Payment is most often asked for in crypto-currency, such as

Cyber scams are increasing every month and the techniques used are becoming more advanced. Phishing is one of the oldest and most common attacks used today. These schemes typically come by email, disguised as a trusted individual