Archives - Antivirus Definition


What is end-of-life software?

Sometimes vendors will discontinue support for a software program or issue software updates for it (also known as end-of-life [EOL] software). Continued use of EOL software poses consequential risk to your system that can allow an attacker to exploit security vulnerabilities present that could result in malware attacks. The use of unsupported software can also […]

What are patches?

Patches are software and operating system (OS) updates that address security vulnerabilities within a program or product. Software vendors may choose to release updates to fix performance bugs, as well as to provide enhanced security features. Vulnerabilities in software applications provide easy access for malware to infect your PC. Total Defense Ultimate Internet Security scans […]

What is a Two-factor authentication?

Two-factor authentication is a method of confirming users’ claimed identities by using a combination of two different factors: 1) something they know, 2) something they have, or 3) something they are. A good example of two-factor authentication is being frequently used on gmail.com. Every fresh login would ask for the password & a system generated […]

Know the differences between viruses, malware and ransomware

These terms are often used interchangeably but they refer to different threats. Viruses can self-replicate and spread easily through a computer or network. Ransomware is designed to hold data hostage by encrypting it and asking you to pay for the decryption key. Malware is a broad category that includes these two threats and many others.

What are social networking sites?

Social networking sites, sometimes referred to as “friend-of-a-friend” sites, build upon the concept of traditional social networks where you are connected to new people through people you already know. The purpose of some networking sites may be purely social, allowing users to establish friendships or romantic relationships, while others may focus on establishing business connections.

Understand man-in-the-middle attacks

This type of attack involves someone secretly altering what seems like a direct exchange between two parties. A classic example is someone stealing information from a user connected to a public Wi-Fi network. One way to fend off such attacks is by using a virtual private network to shield your connection.