What is a VPN (Virtual Private Network)?

A VPN (Virtual Private Network) creates a secure connection to the internet called a tunnel. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and encrypt traffic from the ISP (Internet Service Provider). Many services create a secure connection to the internet using third-party applications, which are easy to install, configure, and …

What is Blackhole Exploit Kit?

This threat is caused by code that can be hacked into a web page. When you browse to a web page with this threat it will exploit vulnerabilities in your Internet browser/plugins and force adware, phishing programs or any other type of fraudulent software to be installed on your device. The most popular variants of Blackhole Exploit Kit are Blackhole …

What is a Rootkit?

Once a malicious program is installed on a system, it is essential that it stays concealed, to avoid detection. Techniques known as rootkits allow this concealment, by modifying the host’s operating system so that the malware is hidden from the user. Rootkits can prevent a malicious process from being visible in the system’s list of processes, or keep its files …

What is a Computer Virus?

A computer virus is a computer program that can replicate itself and spread from one computer to another. The term “virus” is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Any virus will by definition make unauthorized changes to a …

What is Malware?

Malware, short for malicious software, is software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. While it is often software, it can also appear in the form of scripts or code. ’Malware’ is a general term used to refer to a variety of forms of hostile, intrusive, or annoying …

What is Spyware?

Spyware is a type of malware installed on computers that collect information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users. While the term …