Catfishing refers to the process of establishing a false profile on a dating or social networking website or mobile application, in order to deceive and / or abuse others.
Read moreThe CPU is a hardware chip located inside a device. It is the core component of a computing device, yet it can only function alongside other hardware.
Read moreThe Cloud is a general term used to describe a network of servers that applies processing and storage capabilities. It refers to software and services that run on the internet, instead of locally on your computer.
Read moreCloud Security refers to control-based technologies and policies deployed to protect information, data, applications, and infrastructure associated with cloud computing.
Read moreCoin mining is the process of running complex mathematical calculations that are necessary to maintain the blockchain ledger, in order to generate crypto coins.
Read moreA computer virus is a type of malicious software loaded onto a user's computer, often without their knowledge. Much like an animal virus, it is designed to spread from host to host, and has the ability to replicate itself.
Read moreCredential stuffing is a specific type of cyber attack where the attacker uses stolen account credentials, usually log in and password information, and uses them to access personal or private accounts through login forms. As users typically reuse credentials - choosing the same passwords for various accounts - once an attacker has hacked them, he can reuse these credentials to access many accounts on other sites as well.
Read moreCryptography is the study of secure communication techniques within cybersecurity. Closely related to encryption, the aim is to allow only the sender and intended recipient of a message to view its contents, by encrypting the information. Obfuscation is used to blur texts and images - which can then be unscrambled using a 'key', in order to best transmit electronic data without it being intercepted.
Read moreCryptojacking refers to the act of hijacking a computer to use it's power, in order to mine cryptocurrencies against a user's will while they are unaware. Cryptojacking can be achieved through a web browser or on a user's hard drive.
Read moreCryptomining refers to the act of generating crypto coins - a digital currency that uses cryptography to record, sign and send transactions. It also involves verifying the legitimacy of cryptocurrency transactions on a blockchain.
Read moreA cyber attack is an attempt by cyber criminals, hackers, or other digital adversaries to access a computer network or system, usually for the purpose of altering, stealing, destroying, exposing, or altering the integrity information.
Read moreCyber espionage is a form of cyber attack that steals classified, sensitive data or intellectual property to gain an advantage over a competitive company or government entity.
Read moreCyber threat hunting is a method of cyber defense whereby all aspects of a network are searched, in order to identify and isolate advanced threats that have circumvented established security solutions.
Read moreUnlike cyber espionage, which uses sensitive information for personal gain, technological purposes, or politics, cyber warfare is intentionally military action. It involves attacking and damaging critical computer systems, not just to steal information but also to disrupt, destabilize and force change.
Read moreCybersecurity is the act of defending devices, digital assets, networks, systems, and data from cyberattacks. Also known as information technology (IT) security, a modern cybersecurity solution will use a combination of advanced technologies and human resources to prevent, detect and mitigate a vast array of digital threats and adversaries.
Read more