Category Archives: Blog

Drive-By Download

Drive By Download
[vc_row][vc_column][vc_column_text] What is a drive-by download? When your computer is infected by a malicious program simply because it visited a website, this is known as drive-by download. This type of attack is so-named because a user doesn’t have to stop or even click on a page in order for a dangerous code to be downloaded […]

Hidden Dialer

Hidden Dialer
[vc_row][vc_column][vc_column_text] What’s a hidden dialer? Hidden dialers are programs that secretly use your computer to dial telephone lines. Hidden dialers are often hard to detect and if left untreated, can lead to you receiving an unexpected phone bill. This results from the dialer calling many telephone numbers, sometimes that are long-distance. They could also connect […]

Macro Virus

Macro Virus
[vc_row][vc_column][vc_column_text] What is a Macro Virus? A macro virus is a malicious program that can be embedded into a particular software application, such as a word document or spreadsheet application. Microsoft Office programs, such as Word and Excel, are common targets of macro viruses, which have existed for more than 20 years. How do they work? […]

Whaling

Whaling
[vc_row][vc_column][vc_column_text] What is Whaling? Whaling is a particular form of a phishing scam that targets a high-profile victim such as a CEO, CFO or other executive, typically in a private company. What’s the point of whaling? Con artists with the proper skills may decide to look for a big “catch” instead of spending their time […]

Identity Theft Glossary

identity theft glossary

The ID Theft Glossary: Things You Must know About Identity Theft Knowledge puts you on the offense against identity theft. According to the Identity Theft Resource Center, it can take you over 300 hours to recover from identity theft without ID theft protection. The more you know, the better off you are to protect yourself from identity theft. We created this […]

SMiShing

smishing

What is SMiShing? SMiShing is short for “SMS phishing” and is an attack against a cellular phone or other mobile device. Victims are typically tricked into downloading a Trojan horse, virus or other malicious file onto the phone. To understand SMiShing, you must first know that SMS is short for “Short Message Service,” but you […]

Your Privacy is Under Attack on all Fronts

your privacy is under attack

  When security professionals get together these days, it becomes rapidly clear that there are so many threats to privacy, it’s difficult to know exactly where to start. Adopting stronger security protections may briefly slow the unwanted gathering of personal data, but the sheer number of threats and technology options are very much in favor […]

Computer Worm

Computer Worm
[vc_row][vc_column][vc_column_text] What is a computer worm? Unlike computer viruses, a computer worm acts on their own to self-replicate and spread through computer networks without the need of a hacker’s assistance. Because worms can make copies of themselves, they often spread quickly and infect computers with malicious programs. Where do worms come from? While there are […]

Wardriving

Wardriving
[vc_row][vc_column][vc_column_text] What is wardriving? Wardriving is the process of seeking out accessible Wi-Fi networks by traveling around a community in a moving vehicle with a laptop computer, smart phone or personal digital assistant. How does wardriving happen? Hackers often drive around and look for unsecured wireless Internet connections, or Wi-Fi. They do so hoping to […]

Spoofing

Spoofing
[vc_row][vc_column][vc_column_text] What is Spoofing? Just as the name suggests, a spoofing attack occurs when someone with malicious intent fools or impersonates a particular device or user on a computer network to steal data, use malware or find a way around certain controls. To fully understand them, you’ll likely need to know about servers and networking. […]