Seven Steps to Recover from Scareware
Scareware is the catch-all name used for any of the numerous programs…
MAC viruses are here to stay…10 Examples of MAC viruses
It’s a common belief that Macs are safer than PCs because most…
Malware Reigned Supreme In 2012
Hackers spent much of 2012 laying the groundwork for what they have…
Botnets Using New Techniques to Spread Malware
Botnets are large networks of computers that spread malware across the Internet.…
What is a rootkit and how to remove it
Rootkits have been around for nearly 20 years now, allowing attackers to…
The Importance of Destroying Malware
No one likes malware. In fact, pretty much everyone hates it. But…
A New Trojan Virus on Skype – Kaspersky Daily
Even cautious users might easily fall prey to cybercriminals when a malicious…
What is a Keylogger -Kaspersky Daily
Today’s advanced malware tools often comprise several different components, each with a…
What is a Botnet? -Kaspersky Daily
Botnet is the generic name given to any collection of compromised PCs…
Luna and Black Basta cross-platform ransomware
Ransomware groups are of late increasingly targeting not only Windows computers, but…