Archives - Malware


Avoid side-loading apps

Side-loading is the practice of downloading applications that have not been approved by the operating system’s official app store. It’s usually not worth the risk, as there’s no assurance these apps have been scanned for malware. Stick to the official channels.

Is your internet router leaving you vulnerable to malware?

You probably don’t spend a lot of time thinking about your internet router, unless it struggles to deliver reliable Wi-Fi or Ethernet. If it’s working properly, it’s virtually invisible. However, with the rapid rise of the Internet of Things (IoT), these same routers have become the new front lines in network security, emerging as some of the biggest […]

Types of Malware: What is a Computer Virus?

A computer virus is a type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be “infected” with a computer virus. Computer viruses currently cause billions of dollars’ worth of economic damage each year, due […]

The Worst Malware of 2018

In our year-end roundup of the worst malware threats of 2017, we compared malware to actual biological viruses, in that both are ever-evolving phenomena. For example, you know how it’s recommended for certain demographics to get a flu shot every year?  The rationale is simple: The flu virus itself is never identical from year to year, meaning that […]

Steer clear of P2P websites

Peer-to-peer (P2P) websites are fraught with risk. While you’re searching for links to torrents, you might see thumbnails for stories that seem oddly relevant or interesting, with titles like “New rule in [your location].” A lot of these links lead to malware, so don’t click them or, better yet, don’t visit P2P sites to begin […]

Types of Malware: What are Botnets?

Networks of computers infected by malware and controlled remotely by cybercriminals, usually for financial gain or to launch attacks on websites or networks. Many botnets are designed to harvest data, such as passwords, Social Security numbers, credit card numbers, and other personal information.