Trojan Horse – Back Door

A Trojan Horse or back door is a computer program that appears to be useful, but also has a hidden and usually malicious function that evades security mechanisms, typically by exploiting the user’s information, credential etc. It is typically delivered through an attachment to an email message or a link from within the email message. The purpose of the Trojan is to steal information, credentials, and identities for evil purposes…

Read More

Creating strong passwords

“Three may keep a secret, if two of them are dead.” – Benjamin Franklin, Poor Richard’s Almanack Remembering all the passwords you use alone can be tough. Remembering secure passwords can be even tougher though. Thankfully, there are ways to create an easy-to-remember password without sacrificing the level of security it provides. Part 1– Making a Strong Password  First, we’ll review the guidelines for a strong password A strong password…

Read More

What is Phishing or Spear Phishing?

Phishing is a malicious email designed to bait the recipient into clicking on a malware infected attachment or visiting a trojan backdoor infected web site. Spear-phishing is targeted of phishing that appears to come from a trusted source like a vendor, friend, or even your own IT Department. By personalizing the message, users are more enticed to click or open the attachment. How to stop Phishing Attacks?

Read More