Fake anti-virus programs prey on people’s fear of malicious software. They are typically installed when someone clicks on a link in an e-mail, or clicks on an item listed after a search engine query, or clicks on a rogue advert on web pages. When launched, the fake anti-virus program claims to find malware on the victim’s computer, but requests payment in order to remove it. Not only does the victim hand over money to fix a problem that doesn’t exist,… Read Full Article
A false positive is another way of saying mistake. As applied to the field of anti-malware programs, a false positive occurs when the program mistakenly flags an innocent file as being infected.This may seem harmless enough, but false positives can be a real nuisance. The term is not confined just to the anti-malware world. It also applies, for example, to anti-spam protection, where it refers to the misidentification of a legitimate e-mail message as spam. This too could be very… Read Full Article
This term is taken from the world of fire-fighting, where a firewall is a barrier created to block the spread of a fire. In computing, a firewall forms a barrier between a computer system (either a corporate system or a single consumer) and the outside world: the aim is to prevent outsiders from gaining unauthorized access to the protected network. The firewall monitors incoming and outgoing network traffic and decides whether to forward it or block it depending on the… Read Full Article
A type of Denial-of-service attack which is conducted by flooding the targeted system with excessive number of requests in order to overload it and to prevent its normal functionality.
Malicious technique that tries to steal authorization credentials from a web data form before it is passed to a secure server via encrypted protocol.
Deliberate deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. In the context of cybersecurity — cyberfraud is usually an attempt to deceive a victim in order to gain access to his banking account.