0

FAQs

What is Cyber Security?

Cybersecurity is a technique developed to protect Internet-connected systems, networks, and data from unauthorized access, attack and destruction. It's an attempt of users to reduce the risks of cyber attacks.

What is a Cyber Attack?

A cyber attack is an attack launched from one device to another in order to gain unauthorized access and make damage, disrupt, or destroy sensitive information. Hackers sometimes attack users in order to extort money or interrupt normal business processes.

How can you protect yourself from Cyber Attacks and Threats?
  • Check the authenticity of all received emails
  • Avoid opening unfamiliar messages, emails or attachments
  • Avoid clicking on any links in emails received from unknown senders
  • Always check the address of the sender and the email for typos or spelling mistakes
  • Avoid downloading any content from unknown and unsecure websites
  • Always keep your operating systems and browsers up to date
  • Avoid visiting non-secure web pages
  • Enter confidential information only when you visit secure websites (with https:// and a padlock in the URL)
  • Always check you bank accounts and credit cards for unusual transactions
  • Always monitor your downloads made via P2P networks
  • Always use firewall to prevent any unauthorized access to your computer
  • Install an antivirus program
  • Keep your antivirus program up to date
What is a Cyber Threat?

Cyber threat is the possibility of a successful cyber attack with a goal to gain unauthorized access and disrupt a device network and system or steal sensitive information. These kinds of threats are launched to damage and steal data, or disrupt digital assets in general. These malicious acts can come from a variety of sources including trusted users or unknown parties from remote locations.

What is an antivirus software, and how does it work?

Antivirus software is a computer program developed to prevent, detect, and remove computer viruses and malware such as worms, spyware, adware, etc. The antivirus program usually offers two modes of operation: interactive and scan mode. .


In the interactive mode, the antivirus software is running in the background and monitoring the computer’s activity. In this mode, the program is looking for viruses coming in from the Internet or delivered on removable media.


In the scan mode, the antivirus scans the computer’s memory and its storage system, looking for viruses and other malware. If an infection is found, the antivirus software will notify of its presence. Then, the infected file is either deleted or quarantined for later examination. Either way, whatever operation the virus was set out to run, a reliable antivirus software will prevent it.

Why do you need antivirus software?

Every Internet user needs to have an antivirus software on their device in order to be protected from malware attacks. Without an antivirus program, users risk their personal information, files, browser history, credit card details, and other confidential information to get misused or stolen. If you don't have an antivirus software, third parties can easily track your online activities and collect your data without your consent.

What is malware?

Malware (short for malicious software) is any software intentionally developed to harm your computer. An attacker can steal any information from a device which is already infected with malware. One of the main objectives of malware is to provide an attacker with remote access to an infected computer. With malware, attackers can gain full access to your sensitive files like pictures or videos. They can also steal your confidential data such as banking information and credit card details. There are many different types of malware.


How to protect yourself:
  • Avoid clicking on links received from senders you don't know
  • Avoid download apps from untrusted sources
  • Always keep your systems up to date
  • Always use strong passwords
  • Never use antivirus software that runs from a web page
  • Never use the same password in more than one place
  • Add an additional security layer with a antivirus software
What is a virus?

A virus is a computer program that reproduces itself by modifying computer files. The virus needs a host cell in order to spread. The computer must run the infected file so the virus can do its dirty functions.


How to protect yourself:
  • To protect yourself from viruses, we recommend using GUARD. It will also protect your device from other malware.
What are scams?

Cyber criminals usually trick victims with fake inheritance, travel promotions or winning lottery tickets and other prizes. The potential victim is offered a prize but is also asked to pay a small amount of money in order to gain access to the prize.


How to protect yourself:
  • To protect yourself from scams, we recommend either GUARD or VAULT. This software will also protect you from hacking.
What is spyware?

Spyware is a malicious software designed to gather information about you without your knowledge. It's one of the most common threats that can easily infect your computer. However, it can be very hard to identify.


How to protect yourself:
  • To protect yourself from spyware, we recommend using GUARD. It will also protect you from other malware.
What is phishing?

Cyber criminals send emails that appear to come from trusted sources such as banks, services or utilities. Their main goal is to trick recipients into revealing sensitive data and personal information.


How to protect yourself:
  • To protect yourself from phishing attempts, we recommend using VAULT. This encryption software will also protect you from identity theft.
What is ransomware?

Ransomware is a form of malware that blocks victim's access to their device until a sum of money is paid. Attackers demand ransom in order to restore access to the device upon payment. However, paying ransom doesn't mean that you will regain control of your device.


How to protect yourself:
  • To protect yourself from ransomware, we recommend using GUARD. It will protect your device around the clock.
What are worms

Worms are malicious programs that can replicate themselves in different places on a computer. They can't infect files, but can block communications and even slow down networks. Worms can be spread to other computers through emails, P2P programs, etc.


How to protect yourself:
  • To protect yourself from worms, we recommend using GUARD. This powerful antivirus software will also protect you from bots & rootkits.
What is a Trojan

Trojan is a misleading malware that disguises itself as desirable code. It can be found in games, apps, or attachments in phishing emails. After downloading a trojan, sensitive information can be stolen from the victim's computer.


How to protect yourself:
  • To protect yourself from trojans, we recommend using GUARD. It will protect you from backdoor trojans and other malware as well.
What is a backdoor Trojan?

Backdoor Trojan is a type of virus that allows cyber criminals to gain remote access without the knowledge of administrators. It can go undetected and operate in the background without the users' knowledge.


How to protect yourself:
  • To protect yourself from backdoor trojans, we recommend you use GUARD. It will also protect you from other viruses and trojans.
What are keyloggers?

Keyloggers are tools that monitor and send keystrokes to attackers in order to gain unauthorized access to passwords and other confidential data.


How to protect yourself:
  • To protect yourself from keyloggers, we recommend using GUARD.
What are bots?

Bots help in gaining complete control over a computer. They can launch broad attacks against Internet users or big and small companies.


How to protect yourself:
  • To protect yourself from bots, we recommend using GUARD. It will protect your device around the clock.
What is adware?

Adware is a sneaky variant of malware that has one purpose - to serve unwanted advertisements. It also bombards with annoying pop-ups and collects marketing data about you without your permission. It's hard to find and even harder to remove.


How to protect yourself:
  • To protect yourself from adware, we recommend using VAULT. This encryption software will also protect you from any phishing attempts.
What is a rootkit?

Rootkit is a set of software tools specifically designed to allow malicious programs to gain control of your computer. It can change standard operating system processes and even give attackers remote control of a victim's device.


How to protect yourself:
  • To protect yourself from rootkits, we recommend using GUARD. It will also protect you from bots.
What is rogueware?

Rogueware is a new type of malware that tricks users into buying a tool that helps in malware removal, but in fact it spreads it even more.


How to protect yourself:
  • To protect yourself from rogueware, we recommend you use GUARD. Further, avoid using free software and antivirus software that come with installing anything else on your device.
What is an exploit?

Exploit is a program or piece of code that takes advantage of security vulnerabilities in order for cyber criminals to gain unauthorized access to a computer.


How to protect yourself:
  • To protect yourself from exploits, we recommend you using GUARD. This powerful antivirus software will also protect you from privacy breaches and hacking attempts.
What is fileless malware?

Fileless malware is one of the biggest digital infiltration cyber threats. It uses legitimate programs to infect a computer. This type of malware doesn't leave any footprints, making it very difficult to detect and remove. It exists exclusively as a computer memory-based artifact i.e. in the RAM.


How to protect yourself:
  • To protect yourself from fileless malware, we recommend you using GUARD. This powerful antivirus software will also protect you from spyware and adware.
What is a privacy breach?

A privacy breach is an incident that involves access, use, collection or disposal of someone's personal information without their permission. This information can include the person's name, address, Social Security number, medical records or even credit card details.


How to protect yourself:
  • To protect yourself from privacy breaches, we recommend using VAULT or BLOCK.

We also offer THE PRIVACY SUITE which includes both products.

What is identity theft?

Identity theft is a type of fraud of obtaining and using another person's name and personal information in order to steal money or gain other benefits in the other person's name. The stolen information may be used to fraudulently apply for credit, file taxes, or even get medical services. Users whose identity has been stolen might suffer the consequences if they are held responsible for the thief's actions and are often very hard to prove and may lead to court cases, repossessions and additional fees and payments.


How to protect yourself:
  • To protect yourself from identity theft, we recommend using VAULT. It will encrypt all your personal documents and prevent data mining.
What is a webcam hijack?

Webcam hijack is the ultimate privacy violation. Attackers might gain access to your camera and you might end up being a star of a show without even knowing it, or the audio and video obtained can be used against you to extort money or something else.


How to protect yourself:
  • To protect yourself from webcam hijacking, we recommend using BLOCK. A tape over your webcam may stop hackers from watching your live visual feeds, but it won't stop them to record your voice. BLOCK will also protect you from microphone hijack.
What is a mic hijack?

Mic hijack is recording audio of a device (PC, laptop, tablet or smartphone) without alerting the user. It's important to note that once users allow a website or an app to access their audio, the access will be granted until users manually revoked it.


How to protect yourself:
  • To protect yourself from mic hijack, we recommend you use BLOCK. It will also protect you from webcam hijack.
What is a personal details hijack?

Personal details hijack is stealing information such as name, phone number, address, Social Security number, etc for fraudulent purposes.


How to protect yourself:
  • To protect yourself from personal information hijack, we recommend using VAULT. It will keep all your information such as medical records, financial and medical data, and credit card details safe.
What is a system failure?

System failure is an operating system or hardware malfunction. It can cause the system to freeze or stop functioning completely. It may result in an error displayed on the screen. System failures may cause a computer to shut down as an attempt to prevent further damages.


How to protect yourself:
  • To protect yourself from system failures, we recommend using BOOST. It will also protect you from sluggish startups.
What is a device crash?

Device crash is the sudden failure of a software program or an operating system. Hardware devices such as a hard disk can fail as well.


How to protect yourself:
  • To protect yourself from device crashes, we recommend using BOOST. It will also protect you from system failures.
What is a sluggish startup?

Sluggish startup is when the computer is slow and unresponsive at startup. One of the reasons for a slow startup is the huge number of programs that automatically start or a corrupt registry.


How to protect yourself:
  • To protect yourself from sluggish startups, we recommend using BOOST. It will also protect you from system lags.
What is system lag?

System lag is a slow response from a device at all times, not only at startup.


How to protect yourself:
  • To protect yourself from system lags, we recommend using BOOST. It will also protect you from device crashes.
What is a product key?

Product keys are licenses which are used for the activation of the product on your device.

Where can I find the activation key for my product?

The activation key for the product that you have purchased will be provided to you via accessing your USER AREA by logging in with the email and password you choose during purchase.

How do I install and activate my product?

After you log in into your shnox. USER AREA you will find PDF and video guides for installing and activating the product you have purchased.

Which operating systems are shnox. products suitable for?

The shnox. products can be used on all Windows and Android devices.

Which payment methods are available?

Payment methods include PayPal and most major credit cards such as Visa, Mastercard, American Express, Discover and all debit cards.

Which shnox product is suitable for me?

GUARD is a powerful antivirus which automatically protects your device 24/7 from virus, malware, spyware, privacy breaches, ransomware, bots & rootkits. It will also prevent any hacking attempts and stop attackers from remotely controlling your device.


VAULT is an encryption software which will protect you from identity theft, fraud, information logging, sensitive document access, hacking, scams and phishing attempts. It's built to protect your personal information such as credit card details, financial, and medical records.


BOOST is a system and registry cleaner which protects your device from crashing, system failure and sluggish startup. It's made to repair registry issues, fix system configuration regularly and keep your PC running smoothly.


BLOCK is a software that is made to stop malicious third parties from hijacking your webcam and microphone and hacking your device.


Instead of purchasing single licences for each product, we have available SUITES with a combination of our most used products depending on customer demand and need.
They are:


THE CYBER SUITE - a bundle of ALL shnox. products, offering ultimate protection for your device. With this suite:

  • You will receive protection on all you personal data, such as credit card details, medical and financial records
  • Your information will be encrypted while you are searching the web
  • Your device will be protected from hacking attempts and remote control
  • Hackers won’t be able to hijack your webcam or microphone
  • Your device will be protected from crashing, system failure, and registry issues
  • You won’t see any unwanted ads and pop-ups
  • Your online activities & browsing history to be tracked.

THE PRIVACY SUITE includes both VAULT & BLOCK. This suite will ensure that all of your personal information remains private and will stop all hijacking attempts on your webcam or mic.


THE SECURITY SUITE includes both GUARD & BLOCK. This suite will protect your device from any kind of malware and webcam or mic hijacking attempts. Also,they update automatically so you will always have the latest version after purchasing.

No results foundPlease search for a different keyword
talk to a pro