Categories
IT Security Outsourced IT

Quarantined Files

What are Quarantined Files? Quarantine is a special isolated folder on a machine’s hard disk where suspicious files detected by antivirus and antimalware software solutions are placed to prevent further spread of threats. Quarantine allows users to review suspicious and potentially dangerous files from all machines and decide whether they should be removed or restored. […]

Categories
Application Security IT Security Outsourced IT

Object Linking and Embedding Malware

What is Object Linking and Embedding Malware? Object Linking and Embedding (OLE) allows users to create and edit documents that contain objects created by different applications. OLE technology gives users the ability to create compound documents that support a host of software applications, such as Microsoft Windows applications, Corel WordPerfect, Adobe Acrobat, AutoCAD, and multimedia […]

Categories
IT Security Outsourced IT

Fileless Malware Attacks

What are Fileless Malware Attacks? Fileless malware is a type of malicious activity that uses native, legitimate tools built into a system to execute a cyberattack. Unlike traditional malware, fileless malware does not require an attacker to install any code on a target’s system, which makes it difficult to detect. This fileless technique of using […]

Categories
Application Security IT Security Outsourced IT

Android Trojans

What are Android Trojans? Android trojans are malware applications that can perform a variety of malicious activities through your Android device. Two recent large-scale Android trojan attacks include: Nexus Android Trojan. The authors of the Nexus Android Trojan have made the malware available to other threat actors via a malware-as-a-service (MaaS) program, where individuals and […]

Categories
Application Security IT Security Outsourced IT

Antivirus Protection

What is Antivirus Protection? Antivirus software protects devices against viruses and malware through a combination of prevention, detection, and removal. Antivirus software can be installed on computers and other devices, such as smartphones and tablets. The two major types of antivirus protection are1: Traditional antivirus protection. Traditional antivirus software relies heavily upon the signature, or […]

Categories
IT Security Outsourced IT

Malicious Images

What are Malicious Images? There are innumerable cybersecurity threats out there, but you may be surprised to learn that images are among them. Image steganography refers to the practice of representing information within another image in such a way that the information is not evident to human inspection. The standard JPEG photo contains several megabytes […]

Categories
IT Security Outsourced IT Websites

Google Ads Malware

What is Google Ads Malware? Cyberattackers have been increasingly using Google Ads to spread malware. The cyberattackers often clone official websites and distribute trojanized versions of the software when users attempt to download. Some of the products that have been impersonated in Google Ad malware attacks like this include Grammarly, MSI Afterburner, Slack, Dashlane, Malwarebytes, […]

Categories
IT Security Outsourced IT

Wiper Malware

What is Wiper Malware? Wiper malware is malware that is designed to wipe (erase) the hard disk of a victim’s computer. Wiper malware is being seen more frequently, and it can be achieved through a number of techniques: Overwriting files. With this approach, the cyberattacker simply enumerates the filesystem and overwrites the select files with […]

Categories
IT Security Outsourced IT

Microsoft Word and Microsoft Teams Threats

What are Threats to Microsoft Word and Microsoft Teams? Recently, cyberattackers have infiltrated two different Microsoft products- Microsoft Word and Microsoft Teams. Malware-Infested Word Documents A novel strain of malware which goes by the name of SVCReady has been spread through phishing attacks, with most infections occurring among computers that lack antivirus software. The infection […]

Categories
IT Security Outsourced IT

Logic Bomb

What is a Logic Bomb? A logic bomb is a piece of malicious code that cyberattackers insert into an operating system or software that lies dormant until a specific condition is met. The conditions could be set to a pre-selected date/time (also known as a time bomb) or they could be set to be activated […]