September 2019

Introduction to Spyware, Adware, and Scareware

In the previous article, I discussed malware, including its types: viruses, worms, ransomware, trojan horses, logic bombs, back doors, and rootkits. This article should discuss malware types, spyware, adware, and scareware. Spyware A computer installs this software without the end-user knowledge, enabling a criminal to get information about the user’s computer activities. The spyware activities

Introduction to Spyware, Adware, and Scareware Read More »

Common Threats to End Users and Internet Services

Innovators and visionaries are two types of cybersecurity experts. These experts build different cyber domains of the Internet. They have the capability to find the power of data and bind it. They provide cybersecurity services and build special organizations for these services. These organizations provide protection services to people from cyber attacks. These professionals must

Common Threats to End Users and Internet Services Read More »

Thwarting Cybercriminals – Exclusive Explanation

Thwarting cybercriminals is not an easy task. However, companies, governments, and organizations have started to take parallel action to limit and discourage cybercriminals. The following are actions thwarting cybercriminals. The following are the measures for thwarting cybercriminals and a brief explanation of each. Vulnerability Database The National Common Vulnerabilities and Exposure (CVE) was developed as

Thwarting Cybercriminals – Exclusive Explanation Read More »

Who Are Cybercriminals?

The typical cybercriminals in the cyber world in the early days were youngsters or hobbyists. Their attacks were generally limited to pranks and vandalism. But now, cybercriminals have become very dangerous. The attackers are individuals or groups. They try to make use of the vulnerabilities for their mission. These criminals are interested in credit cards,

Who Are Cybercriminals? Read More »

Types of Vulnerabilities to Network- Exclusive Explanation

Weaknesses of the network which is intrinsic in every network and its device which included routers, switches, servers, desktops and even security devices e.g. firewall etc. Usually, the endpoints, such as servers and desktop computers, are under attack. Defending the privacy of information, securing from unauthorized access and shielding the network against attacks is the

Types of Vulnerabilities to Network- Exclusive Explanation Read More »