Safe & Security Articles

Page 35 of 88

The WhatsApp’s Two-step Verification

karthikeya Boyini
karthikeya Boyini
Updated on 27-Apr-2022 2K+ Views

If I ask you what are the basic necessities of life, you would answer food, clothing shelter with internet and a smartphone of course. No, we are not discussing about internet but a reason why we desperately want internet, yes that’s right, for WhatsApp. WhatsApp is a must have app these days for every smartphone owner.WhatsApp is the most popular and widely used messaging app. It is impossible to talk about WhatsApp and not include the privacy and security part in it. We use lots of measures to maintain our privacy, like pattern lock, password protection, archive the chats etc. ...

Read More

What is PUP?

PranavBhardwaj
PranavBhardwaj
Updated on 20-Apr-2022 778 Views

If you find some random applications appearing on your system that you do not remember installing, they might be Potentially Unwanted Programs (PUPs).Let us know more about PUP, how it gets an entry on your system, and how to prevent it.What is PUP?As its acronym suggests, PUP or Potentially Unwanted Programs are the software that users never intended to download and install into their devices but still get stuck with them. PUP is also known by other names like Bundleware, Potentially Unwanted Application (PUA), Bloatware, or Junkware.Technically, a PUP is not malware and cannot create destructions like Trojans and Ransomware ...

Read More

What is a Browser Hijacker?

PranavBhardwaj
PranavBhardwaj
Updated on 20-Apr-2022 265 Views

If the default search engine, homepage, and other settings are randomly changing on your browser, it might be caused by a Browser Hijacker.Let us know what Browser Hijacker is, how it got into your system, and how to get rid of it.What is a Browser Hijacker?A Browser Hijacker is an unwanted malicious program that infiltrates the system and modifies the browser's settings without user permission. This is primarily done for promoting an affiliated web page or controlling the browser for conducting other illicit acts. The aim of a Browser Hijacker is to generate revenue by redirecting users to certain pages ...

Read More

What is Grayware?

PranavBhardwaj
PranavBhardwaj
Updated on 20-Apr-2022 2K+ Views

Some malicious programs are not as devastating as Trojans or Virus but still possess danger to the system. Such programs are coined under the term Grayware.In this post, we will know more about Grayware, how it enters your device, and how to prevent it from infiltrating your system.What is Grayware?As its name suggests, Grayware is a software type that comes between malicious(black) and non-malicious(white) software categories. Grayware programs can be used for both legal and illegal activities. For example, Spyware and Keyloggers can be categorized under Grayware. They can be legally used by organizations to track the activities of their ...

Read More

What is Keylogger?

PranavBhardwaj
PranavBhardwaj
Updated on 20-Apr-2022 2K+ Views

If you suspect everything you type from your keyboard is getting recorded and logged, then there might be a Keylogger present on your device. In this post, we would discuss what Keylogger is and how to prevent it from entering your system.What is Keylogger?Keylogger is a malicious program that is specifically designed to monitor and log the keystrokes made by the user on their keyboards. It is a form of spyware program used by cybercriminals to fetch sensitive information like banking details, login credentials of social media accounts, credit card number, etc. A keylogger can monitor and log such information ...

Read More

What is Spyware?

PranavBhardwaj
PranavBhardwaj
Updated on 20-Apr-2022 544 Views

Suppose you notice your system is consuming a lot more internet data than usual, and your device is regularly heating up even though you are not using it. In that case, it is possible that a Spyware program is hidden on your system, which is causing such irregularities.In this post, we would discuss more on Spyware and how to get rid of it.What is Spyware?Spyware is a broad category of malware program that infiltrates the user's system without permission to perform various malicious tasks. As its name suggests, Spyware is basically meant for spying on the users and collect their ...

Read More

What are the Effects of Cyberwarfare?

Revathy Nair
Revathy Nair
Updated on 20-Apr-2022 1K+ Views

What is Cyberwarfare?In this twenty-first century, one-third of the world's population has access to technology. These technological changes have led to war among nations, and the nature of war has transformed. So, we can say that the world is entering into a new age of warfare; it is an Internet-based conflict.Cyberwarfare is a well-planned competition conducted in cyberspace. It allows countries to conduct undercover operations on a large scale anonymously. Cyberwarfare can occur in at least five different spaces—economic, societal, cultural/intellectual, military, and political. Cyberwarfare is basically the theft of critical data or hacking data of institutions, businesses, or governments. ...

Read More

Cybercrime and its Impacts on Younger Generation

Revathy Nair
Revathy Nair
Updated on 20-Apr-2022 5K+ Views

What is Cybercrime?Cybercrime is also known as Computer Crime, which specifically involves a computer and a network. The computer involved could be the guilty or the victim. Cybercrime could be responsible for harming somebody's both financial health and security.Cybercrime can be intercepting or disclosing someone's private information while being sent or received. This information could be very confidential. Globally, both government officials and non-officials engage in computer crimes like espionage, financial theft, and other cross-border crimes.Two main categories of Cybercrimes are as follows −Criminal activity that targets computersCybercrimes that target computers often involve malware like viruses.Criminal activity that uses computersCybercrimes ...

Read More

How to Combat Injection Attacks?

Revathy Nair
Revathy Nair
Updated on 20-Apr-2022 430 Views

What is an Injection Attack?Cyber Hackings can occur due to a security flaw of any site which then leads to the extraction of private information, inserted or deleted data, and destroys operations for the entire website. Injections are one of the oldest and the most dangerous attacks focussing on harming web applications. It is because it tops the list of vulnerabilities. The codes received by the server from the browser are executed. It may result in loss of knowledge and denial of access. To avoid injection attacks, one must code their web applications in the most secure way possible to ...

Read More

What is Ransomware Attack?

PranavBhardwaj
PranavBhardwaj
Updated on 20-Apr-2022 783 Views

If you find that documents, pictures, and other files on your system are automatically renamed by appending an unknown suffix, then it might be because of a Ransomware attack. In this guide, we would discuss in detail what Ransomware is, how it works, and how to prevent Ransomware attacks on your system.What is Ransomware?Ransomware is one of the deadliest malware programs that, after infiltrating the system, lock the files with strong encryption. After encrypting the files, the cybercriminal(s) behind the attack would ask the victim for the ransom in return for an encrypting tool or key.Without the decrypting key or ...

Read More
Showing 341–350 of 875 articles
« Prev 1 33 34 35 36 37 88 Next »
Advertisements