Viruses are a self-replicating program that can attach itself to another program or file in order to reproduce. The virus can hide in unlikely locations in the memory of a computer system and attach itself to whatever file it sees fit to execute its code. It can also change its digital footprint each time it reproduces making it even harder to track down in the computer.
Worms do not need another file or program to copy itself; it is a self-sustaining running program. Worms replicate over a network using protocols. The latest incarnation of worms make use of known vulnerabilities in systems to penetrate, execute their code, and replicate to other systems such as the Code Red II worm that infected more than 259 000 systems in less than 14 hours. On a much larger scale, worms can be designed for industrial espionage to monitor and collect server and traffic activities then transmit it back to its creator.
A Trojan horse is designed to perform legitimate tasks but it also performs unknown and unwanted activity. It can be the basis of many viruses and worms installing onto the computer as keyboard loggers and backdoor software. In a commercial sense, Trojans can be imbedded in trial versions of software and can gather additional intelligence about the target without the person even knowing it happening. All three of these are likely to attack an individual and establishment through emails, web browsers, chat clients, remote software, and updates.
It is the modification and dissemination of correct and incorrect information. Information modified could have been done without the use of computers even though new opportunities can be found by using them. To set someone into the wrong direction or to cover your tracks, the dissemination of incorrect information can be utilized.
The deep web is part of the world wide web that is full of databases and other services that cannot be indexed by conventional search engines. It requires special software to access it and cyber criminals can use this to advertise their criminal services anonymously. It is also used by users who choose to remain anonymous and keep their web activities private.Read More
Social engineering is the art of manipulating people so they give up confidential information. Humans tend to be the weakest link in the security chain even when they have the appropriate security software in place. Our team can educate you and your users on what to look out for and common techniques used to extract your information.Read More
Our Team can identify, quantify, and report the potential vulnerabilities in your IT Systems. We can asses your Websites, Firewalls, and internal policies to help minimize the potential external threats an outside hacker may try to expose.Read More