6 Facts About the Creeper Computer Virus

6 Facts About the Creeper Computer Virus

Of all the different forms of malware, computer viruses rank as one of the most common. They are surpassed only by Trojans, in fact. Statistics show that roughly 64% of all malware infections on Windows computers involve trojans and 15% of all malware infections on...
5 Cybersecurity Tips for Medical Practices

5 Cybersecurity Tips for Medical Practices

Medical practices in the United States and across the globe are increasingly falling victim to cyber attacks. These malicious intrusions often target medical IT systems, aiming to pilfer patient data which can later be sold on the illicit market to the highest bidder....
Understanding Privilege Escalation: What You Should Know

Understanding Privilege Escalation: What You Should Know

Cybersecurity encompasses hundreds of concepts. While you might be familiar with some of these concepts privilege escalation is a related concept that often goes unnoticed. Nonetheless, it can pose a serious risk to your business and its information technology (IT)...
Goodware vs Grayway vs Malware: What’s the Difference?

Goodware vs Grayway vs Malware: What’s the Difference?

Do you know the difference between goodware, grayware and malware? Most software products fall under one of these three categories. Whether you’re downloading software for personal or commercial use, you should consider its classification. As you may already...
6 Things You Didn’t Know About Keyloggers

6 Things You Didn’t Know About Keyloggers

You can’t rely on a monitor privacy film to prevent other users from seeing what you type. If your computer is infected with a keylogger, the hacker who deployed it will capture your keystrokes. Also known as keyboard-capturing malware, keyloggers are a form of...