CSCI2.5 Lab: Installing and Using Antivirus Software

Downloading and installing Antivirus software Today we’re going to download and install antivirus software. We’re going to download Avast because it has a free version and it is also highly rated. Typically, an unpaid antivirus version will not contain all the features (like identity theft protection, etc.). Also, you may encounter advertisements in the product […]

CSCI2.4 Worms

How do computer worms work?  Worms can be transmitted via software vulnerabilities, which are weaknesses in the system that malware can exploit to gain access to the system. Computer worms could also arrive as attachments in spam emails or instant messages (IMs). Once opened, these files could provide a link to a malicious website or […]

CSCI2.3 Trojans

A Trojan acts as a bona fide application or file to trick you. It seeks to deceive you into loading and executing the malware on your device. Once installed, a Trojan can perform the action it was designed for. A Trojan is sometimes called a Trojan virus or a Trojan horse virus, but that’s a […]

CSCI2.2 Spyware

Spyware Definition Whether legitimate or based in fraud, spyware’s surveillance activity leaves you open to data breaches and misuse of your private data. Spyware also affects network and device performance, slowing down daily user activities. By becoming aware of how spyware works, you can avoid issues in enterprise and personal use. In this article, we’ll […]

CSCI2.1 Viruses

Malware Self-Check! What is a Computer Virus? What this short video to learn what is a computer virus. A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Computer viruses cannot reproduce and spread without attaching to a file or document. A […]