Malware

What Are Virus Scanners?

What Are Virus Scanners?

An antivirus program protects computers from malicious software. This can be, for example, Trojans, worms or spyware, and other malware. Antivirus software is able to detect, block and remove malicious software. What are virus scanners? Basically, virus scanners, often called malware scanners, can be divided into different types depending on their function. Commonly used is …

What Are Virus Scanners? Read More »

What Is a Browser Hijacker?

What Is a Browser Hijacker

A browser hijacker is a program that changes the settings and behavior of a web browser. The manipulations range from displaying advertisements and changing the start page to introducing dangerous malware, stealing data, and taking over the entire system. Often installed browser extensions are the source of a browser hijacker. What is a browser hijacker? …

What Is a Browser Hijacker? Read More »

What is Code Injection?

What is Code Injection?

Code injection allows the infiltration and execution of unwanted program code due to vulnerabilities in computer programs or in web applications. This is possible, for example, if a user’s input is not sufficiently checked and passed to the interpreter. Common examples of program code injection in the web environment are Cross Site Scripting (XSS) and …

What is Code Injection? Read More »

What is LOLBAS (Living Off The Land Binaries And Scripts)?

What is LOLBAS (Living Off The Land Binaries And Scripts)?

The acronym LOLBAS stands for a method that misuses existing programs on a computer, for example, programs of the operating system, for malicious functions, or for malware. The LOLBAS project collects information about usable binaries, scripts, or libraries and makes them publicly available on the Internet. Defending against such attacks on computers can be difficult. …

What is LOLBAS (Living Off The Land Binaries And Scripts)? Read More »

What is COBIT (Control Objectives for Information and Related Technology)?

What is COBIT (Control Objectives for Information and Related Technology)?

COBIT is a framework for managing a company’s IT. It is intended to ensure optimal coordination between the various business units and IT and to align them jointly to achieve business goals. COBIT was developed by ISACA, the international association of IT auditors. The current version is COBIT 2019 from 2018, a revision of version …

What is COBIT (Control Objectives for Information and Related Technology)? Read More »

Configuring Spam and Virus Protection in Microsoft 365

Configuring Spam and Virus Protection in Microsoft 365

In the Admin Center of Microsoft 365 (formerly Office 365), administrators can create comprehensive policies for virus protection and spam protection. But quick, simple configurations are also possible. In this video tip, we show both ways. Configuring Spam and Virus Protection in Microsoft 365 In any case, anyone using Microsoft 365 (formerly Office 365) with …

Configuring Spam and Virus Protection in Microsoft 365 Read More »

Virus Scan with Microsoft Process Explorer

Virus Scan with Microsoft Process Explorer

Process Explorer from Microsoft Sysinternals can also be used to scan Windows servers and workstations for viruses. In addition to system utilization, attackers can also be detected and combated. Virus scan with Microsoft Process Explorer The free Sysinternals Process Explorer can display the running processes on Windows computers and helps with analysis. This also makes …

Virus Scan with Microsoft Process Explorer Read More »

What is a Trojan Horse?

What is a Trojan Horse?

In the computer environment, a Trojan horse is a program that disguises itself as a useful application. In addition to the obvious functions, it has hidden functions that are executed unnoticed by the user. These can be harmful actions such as opening backdoors or downloading more malware. The terms Trojan horse or Trojan in the …

What is a Trojan Horse? Read More »

What Is Bug in Software?

what is bug in software

A bug is an error in the program code of the software. It has various effects, ranging from undesired behavior to the complete malfunction of an application or a device controlled by software. Already in the development phase, programmers try to find and eliminate bugs. Fixing a bug is called bug fixing. What is a …

What Is Bug in Software? Read More »

What Is Spam?

What Is Spam?

Spam or junk refers to unsolicited electronic messages that often have an advertising character. The increased volume of messages and the additional work required to sort out or process them cause considerable economic damage. What is Spam? Spam, often referred to as junk, is unwanted messages sent electronically, such as e-mails, SMS, or forum messages. …

What Is Spam? Read More »

What Is Spear Phishing?

What is spear phishing?

Spear phishing is a personalized form of the classic phishing attack. A targeted attack on specific individuals or organizations is intended to steal data or install malware on systems. Spear phishing is usually carried out with the help of e-mails or messages on social networks. Attackers have obtained information in advance to ensure that the …

What Is Spear Phishing? Read More »

What Is a Backdoor Attack?

What Is a Backdoor Attack?

A backdoor is alternative access to a software or hardware system that bypasses normal access protection. A backdoor can be used to bypass the security mechanisms of hardware and software. The access may be intentionally implemented or secretly installed. What Is a Backdoor Attack? In the IT environment, a backdoor is an alternative access method …

What Is a Backdoor Attack? Read More »