Author Archives: The Security Advocate

What is Trojan Horse Malware?

January 14th, 2015 | 🕒

Scott Aurnou (http://www.thesecurityadvocate.com/): A Trojan horse (or Trojan, for short) is the security world’s version of a wolf in sheep’s


What is Computer Forensics?

March 21st, 2013 | 🕒

Scott Aurnou (http://www.thesecurityadvocate.com/) – Computer Security Tip of the Week: Computer forensics can be used to preserve electronic evidence and