Advertisement

Malware Questions and Answers (Q&A)

J. Alfie, Content Writer
Answered: Dec 14, 2020
Keyloggers or keystroke logging, or keyboard capturing are programs that are used to record keystrokes. These are used by hackers to steal information. A keylogger can be hardware or software....Read More

2 Answers

9728 views
A virus is a malicious program that cannot do anything until actions are taken to activate the file attached by the malware. At times, one of the major ways to differentiate between viruses and...Read More

2 Answers

3166 views
Lzeltser
Answered: Apr 25, 2024
Packing the malicious executable

By using a packing utility, malware authors encode, encrypt or obfuscate the original executable, making it more difficult to analyze using static code...Read More

1 Answer

973 views
Christian Jackson, Content Developer
Answered: Feb 13, 2019
A Trojan horse virus (often known simply as a Trojan), is unlike other viruses and worms as it does not self-replicate or reproduce by infecting other files. Instead, Trojans require a user to...Read More

2 Answers

379 views
E.Barrington
Answered: Jan 08, 2018
The name "Stuxnet" is not the official name of this lethal virus and was given to it by the Kaspersky(Anti-virus) corporation, which first identified it in the eastern European country of...Read More

2 Answers

344 views
Advertisement
Advertisement
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.