Articles Tagged with: cyber attack

ADWARE

Adware is unwanted software designed to throw advertisements up on your screen, most often within a web browser. Some security professionals view it as the forerunner of the modern-day PUP (potentially unwanted program). Typically, it uses an underhanded method to either disguise itself as legitimate, or piggyback on another program to trick you into installing it on your PC, tablet, or mobile device.Read More


spyware -PasswordStealer

Spyware.PasswordStealer is a generic detection for applications that may run in the background and silently collect information about the system, connected users, and network activity.  Spyware.PasswordStealer may attempt to steal stored credentials, usernames and passwords and other personal and confidential information.  This information may be transmitted to a destination specified by the author.  Spyware.PasswordStealer may allow an attacker to install additional software to the infected machine, or may direct the infected machine to participate in a malicious botnet for the purposes of sending spam or other malicious activities.Read More


keylogger

It is called a keylogger, spyware or monitoring software, it can be the equivalent of digital surveillance, revealing every click and touch, every download and conversation.A keylogger (short for keystroke logger) is software that tracks or logs the keys struck on your keyboard, typically in a covert manner so that you don’t know that your actions are being monitored. Read More


Backdoor

When a site gets compromised, the attackers will often leave some piece of malware behind to allow them access back to the site. Hackers want to leave a door open to retain control of the website and to reinfect it continuously. This type of malware is called a backdoor.Backdoors are types of malware that allow for remote control of a compromised website by bypassing appropriate authentication methods.Even after updating a site, changing its passwords, and doing other post-hack procedures, the backdoor might not be removed. Leaving a backdoor in a website allows it to be accessed unexpectedly.Even though there are backdoors written in all languages, the ones we see the most are done in PHP.Read More


Piggybacking

In two-way communication, wherever a frame is received, the receiver waits and does not send the control frame (acknowledgment or ACK) back to the sender immediately. The receiver waits until its network layer passes in the next data packet. The delayed acknowledgment is then attached to this outgoing data frame. This technique of temporarily delaying the acknowledgment so that it can be hooked with the next outgoing data frame is known as piggybacking.Read More