Cybercriminals create an app that passes as Telegram
Security researchers have released information about a malicious Android program that is circulating in unofficial application markets posing as the…
Emotet Trojan considerably increased in September
Security researchers from different parts of the world have issued security warnings sounding the alarm about an unusual increase in…
Hackers vs Spamhaus a battle given in 2013
Spamhaus, a well known anti-spam organization, which has gained a following over the years for its contributions to Internet safety.…
The DDoS attack on Dyn that took place in 2016
The DDoS cyberattack on Dyn took place on October 21, 2016 and was based on multiple denial of service (DoS)…
GitHub resist the largest DDoS attack 2 years ago
It’s been 2 years since GitHub dealt with what has been to date the largest reported DDoS attack in history,…
MafiaBoy – One of the first DDoS attacks
It’s been about 20 years since one of the first documented Denial of Service (DDoS) attacks was born. The person…
What types of computer worms do we know?
They may not be as destructive as computer viruses, but computer worms can be just as dangerous. A computer worm…
Types of Malware Attacks that we can run into
Malware is just a bunch of bad news packaged as software. It is malicious code whose purpose is to harm…
What variants of Trojans can we find on the Internet?
Within the entire web, different types of programs and different types of technologies used to harm or defraud the user…
Kuik Adware – A simple but dangerous Adware
There are some viruses and malware that seem too simple and easy. However, getting rid of them can be a…

