Keyloggers or keystroke logging, or keyboard capturing are programs that are used to record keystrokes. These are used by hackers to steal information. A keylogger can be hardware or software....Read More
A virus is a malicious program that cannot do anything until actions are taken to activate the file attached by the malware. At times, one of the major ways to differentiate between viruses and...Read More
By using a packing utility, malware authors encode, encrypt or obfuscate the original executable, making it more difficult to analyze using static code...Read More
A Trojan horse virus (often known simply as a Trojan), is unlike other viruses and worms as it does not self-replicate or reproduce by infecting other files. Instead, Trojans require a user to...Read More
The name "Stuxnet" is not the official name of this lethal virus and was given to it by the Kaspersky(Anti-virus) corporation, which first identified it in the eastern European country of...Read More