We use cookies to ensure that we give you the best experience on our website. By continuing to browse, we are assuming that you have no objection in accepting cookies. You can change your cookie settings at any time.

Close

BullGuard Security Centre

Here we explain technical terms and how different security solutions protect your computer, phone or mobile devices.

Computer threats

From virus infections to identity theft, the threats targeting your computer are various and sophisticated.

Computer threats are generally defined as any type of illegal activity that makes use of the internet, a private or public network, or an in-house computer system. While many forms of cybercrime revolve around obtaining sensitive information for unauthorized use, other examples are focused more on invading users’ privacy.

Here’s a wide selection of articles explaining the most common types of malware and cybercriminal attacks, scams and schemes trending today.



Computer threats articles

10

March

2009

A Trojan horse is a destructive program that masquerades as a benign application.... Read more


10

March

2009

BullGuard is with you online

Vey briefly about internet security... Read more


30

January

2008

What is a rootkit?

Rootkits are a malware inventor's dream: they are created to allow worms, bots, and other malware software to hide in plain sight. Rootkits are designed to hide from dete... Read more


29

January

2008

What are zero-day attacks?

There are a few common, but slightly different definitions of zero-day attacks. Some define zero-day attacks as attacks on vulnerabilities that have not been patched or m... Read more


29

January

2008

What are IM attacks?

As computer security has improved, and users have gotten more savvy about not opening every attachment that... Read more


14

December

2007

Essential virus information - how a virus works

The word “virus” is often used as a common term for all malicious programs, but technically a virus is a program or code that attaches itself to a legitimate, executable ... Read more


24

November

2007

What is a computer worm?

A computer worm is similar to a computer virus, but unlike a virus it does not need to attach itself to an existing program. Instead, it can spread copies of itself from ... Read more


19

October

2007

What is a keylogger?

According to experts, keystroke loggers pose more risk to PC users than any other tool used for committing cybercrime. Also known as keyloggers, they are small programs o... Read more


11

October

2007

What is spam?

Spam used to be funny when Monty Python's Flying Circus served up a comedy sketch about a restaurant that served only dishes containing the dubious canned meat. But today... Read more


10

October

2007

What is ransomware?

Imagine someone getting access to your computer, encrypting all your family photos and other priceless files, and then demanding a ransom for their safe return. That is w... Read more


Previous Page 2 out of 2



00: 00: 00: 00
Days Hours Minutes Seconds
Close