IM worm

——————————————————————————– A worm (i.e., a self-replicating program typically designed to perform harm to...

Phishing

In computing, PHISHING is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. ebay, PayPal and many online banks are...

FTP Trojan

——————————————————————————– A type of Trojan horse designed to open port 21 (the port for FTP transfer)...

greynet

——————————————————————————– Programs that network users download and install on their computers — usually...

Rootkit

Rootkits are a malware inventor’s dream: They are created to allow worms, bots, and other malevolent software to hide in plain sight. Rootkits are designed to hide themselves from detection by users and security programs, so they don’t show up in Windows...