MALWARE
Short bio Downloaders and droppers are helper programs for various types of malware such as Trojans and rootkits. Usually they are implemented…
Short bio Rogue scanners, also known as fake scanners, fake AV, or rogueware, are pieces of code injected into legitimate sites…
Short bio A registry cleaner, also known as registry optimizer or registry defragmenter, is a program that claims to clean the…
Short bio Ransom malware or ransomware is a threat that prevents users from accessing their system or personal files and demands ransom payment…
Short bio Point-of-sale (POS) malware is software specifically created to steal customer data, particularly from electronic payment cards like debit and…
Short bio The Neutrino exploit kit is a malicious tool kit, which can be used by attackers who are not experts…
Short bio The term info stealer is self-explanatory. This type of malware resides in an infected computer and gathers data in…
Short bio An exploit kit is a toolkit designed to facilitate the exploitation of client-side vulnerabilities most commonly found in browsers…
Short bio DNS changers/hijackers are Trojans crafted to modify infected systems’ DNS settings without the users’ knowledge or consent. Once the…
Short bio Remote Access Trojans are programs that provide the capability to allow covert surveillance or the ability to gain unauthorized access to…
Short bio Trojan is a malware that uses simple social engineering tricks in order to tempt users into running it. It…
Short bio A computer worm is a type of Trojan that is capable of propagating or replicating itself from one system…
Short bio DDOS, or Distributed Denial of Service tools, are malicious applications designed to mount an attack against a service or website…
Short bio Browser hijackers, or simply hijackers, are a type of malware created for the purpose of modifying Internet browser settings without…
Short bio Botnets are networks of computers infected by a botnet agent that are under hidden control of a third party….