Dialers
A dialer occurs when it changes modem settings.
Trackware
A trackware occurs when it tracks programs, or sends information to third-party organisations.
Hacking Tools
Hacking tools are used by a hacker or unauthorised user to attack or gain unwelcome access to the website.
Joke Programs
A joke program can cause nuisance which may be an annoyance factor. It causes an activity such like a CD or DVD drive of your computer to open at random.
Security Risks
A security risk occurs when a computer is more vulnerable to security threats. If using a harmful program may reduce the protection of the computer and increase the risk that the PC will be attacked.
Suspicious Application
A suspicious application is when a potential application that may pose a risk to your PC.
Cybersquatting
Cybersquatting is the practice of acquiring people to deceive about the company running the site. Typosquatting is another type of cybersquatting.
Hard To Uninstall
These programs are difficult to uninstall. They may leave behind files that may run after the uninstallation process is finished.
Sunday, 25 July 2010
Information on Threats
Drive-By Downloads
A drive-by download is an advantage that creates bugs, such like run malicious software or read data from computer.
Phishing Attacks
A phishing attack occurs when an attacker displays a webpage that sends e-mails to a trusted company.
Spyware
An spyware tracks or sends personal information to third parties. It is also an identity threat.
Viruses
A virus is a kind of malicious code, typically spreads threats.
Heuristic Viruses
A heuristic virus is depending on malicious behaviour. It may steal sensitive information.
Worms
A worm is when it spreads threats, but it sends them directly via e-mail.
Unsolicited Browser Changes
An unsolicited browser change is when it changes webpage to another, that may display ads.
Suspicious Browser Changes
A suspicious browser change is when a user may get permission to download automatically programs without consent.
A drive-by download is an advantage that creates bugs, such like run malicious software or read data from computer.
Phishing Attacks
A phishing attack occurs when an attacker displays a webpage that sends e-mails to a trusted company.
Spyware
An spyware tracks or sends personal information to third parties. It is also an identity threat.
Viruses
A virus is a kind of malicious code, typically spreads threats.
Heuristic Viruses
A heuristic virus is depending on malicious behaviour. It may steal sensitive information.
Worms
A worm is when it spreads threats, but it sends them directly via e-mail.
Unsolicited Browser Changes
An unsolicited browser change is when it changes webpage to another, that may display ads.
Suspicious Browser Changes
A suspicious browser change is when a user may get permission to download automatically programs without consent.
Subscribe to:
Posts (Atom)