spyware

An Analysis of the Spyware Threat and how to Protect a PC

A Brief History of Spyware Spyware has been around since approximately the midlate nineties but it wasn’t until the millennium that Zone Labs founder Gregor Freund coined the name Spyware. Spyware can be clearly defined as invasive (monitoring your browser…

Study of a New Genre of Malwares Called “Scarewares”

Depending on their characteristic, Malware can be broadly classified into various types. Most of us are probably aware of the common terms like Virus, Trojan, Spyware, Adware etc. Author: MICHAEL R. HEINZL Source: Hakin9 9/2010 https://hakin9.org However, on the basis of…

Mobile Malware – the new cyber threat 08/2010

Mobile Malware – the new cyber threat

Botnet:The Six Laws And Immerging Command & Control Vectors Richard C. Batka New BotNet communication vectors are emerging. The industry is not prepared. For the next 20 years, BotNets will be what viruses were for the last 20. Hacking Trust…

Is Anti-virus Dead – The answer is YES. Here’s why…

There have been billions of dollars in damages caused by exploiters on the Internet. These exploiters are intelligent cyber terrorists, criminals and hackers who have a plethora of tools available in their war chest – ranging from spyware, rootkits, trojans,…

Web Malware – Part 1

The Internet has been plagued by a variety of Malware that use the Web for propagation and as these threats loom around in the Internet it can infect even the smartest and the most tech savvy computer users. Author: RAJDEEP…

Beginner’s Guide to Cybercrime

Understanding Attack Methodologies and a More Proactive approach to Defense If you are a regular reader of Hakin9 Magazine, you probably already know a great deal about hacking. But do you know the difference between traditional crime and cybercrime? Do…

Analyzing Malware; Malicious Content

One of the biggest challenges storage managers face is to try and calculate just how much storage is needed by that ultra important, mission critical application in the datacenter. Author: JEREMIAH BROTT Source: Hakin9 3/2010 https://hakin9.org Malware, short for malicious software,…

Double Anti-Spy

When I received the link for Double Anti-Spy I did a little check around on the Internet, as this was a product I hadnt heard of before. According to the website, this product utilises exclusive „double scan” technology which is…

Hardware keylogger a serious threat 01/2010

Hardware keylogger a serious threat

SMS Trickery in Public Transport TAM HANNA My main message for this piece is short and sweet. There is no absolute secure system. Security is nothing more than a measure to increase the price of attacking a system. The more…

Study of a New Genre of Malwares Called “Scarewares”

Depending on their characteristic, Malware can be broadly classified into various types. Most of us are probably aware of the common terms like Virus, Trojan, Spyware, Adware etc. Author: RAJDEEP CHAKRABORTY Source: Hakin9 1/2010 https://hakin9.org However, on the basis of certain…

Analyzing Malware (Part 1)

This article is an introduction to analyzing malware. I will take you through the basic steps you need to perform in order to understand what malware is doing to your systems. Author: JASON CARPENTER Source: Hakin9 https://hakin9.org WHAT YOU WILL LEARN… Why analyzing…

Analyzing Malware

This article is an introduction to analyzing malware. I will take you through the basic steps you need to perform in order to understand what malware is doing to your systems. Author: JASON CARPENTER Source: Hakin9 2/2009 https://hakin9.org WHAT YOU WILL LEARN… Why…