Tags: Captcha, Scam, Bot, Human, Virus, Phishing
More often than we would like, we encounter new and novel attempts by cyber criminals to trick people into either handing over information or downloading malware. And while all are bad, some are more interesting than others, such is the case with the fake captcha scam. So, lets dissect this brazen scam and tell you how you can stay safe from it.
Tags: Computer Worms, Malware, Worms
A computer worm is a standalone malware computer program that replicates itself to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it.
Tags: Virus, Computer Virus
A Computer Virus is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be infected with a computer virus, a metaphor derived from biological viruses.
Tags: Computer Malware, Malicious Software
Malware (a portmanteau of malicious software) is any software intentionally designed to disrupt a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy.
Tags: Computer, Virus, Trojan, Malware
In computing, a Trojan Horse (or simply Trojan) is any malware that misleads users of its true intent by disguising itself as a standard program. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.
Tags: Malware, Zombie
In computing, a zombie is a computer connected to the internet that has been compromised by a hacker via a computer virus, computer worm, or trojan horse program and can be used to perform malicious tasks under the remote direction of the hacker.
Tags: Phishing, Social Engineering
Phishing is a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransom ware.