Tools: How to identify and clean up Windows computers infected with malware and bots

Solution: Follow the steps below in the given order: Step 1: Disconnect the computer from the network and notify the user that the computer cannot be re-connected until all malware has been successfully removed. Step 2: Find out if the user is familiar with the destination or action that the malware or bot is trying … Continue reading Tools: How to identify and clean up Windows computers infected with malware and bots

Infographics: Targeted victim – Spearphishing Attack

SPEAR-PHISHING Spear-phishing is a targeted attempt to steal sensitive information such as account credentials or financial information from a specific victim, often for malicious reasons. This is achieved by acquiring personal details on the victim such as their friends, hometown, employer, locations they frequent, and what they have recently bought online. The attackers then disguise … Continue reading Infographics: Targeted victim – Spearphishing Attack

Infographics: Most Common Forms of Phishing Attacks

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication. Bad guys are trying to phish in more than more ways to get the information they want. The core takeaway is be careful on what to entertain (whether … Continue reading Infographics: Most Common Forms of Phishing Attacks