Our Top Picks
-
7 Sneaky Ways Hackers Can Get Your Facebook Password
Tara Struyk2 monthsFacebook can be a great way to stay in contact with friends and family. But it can also...
-
Can the Blockchain Be Hacked?
Justin Stoltzfus2 monthsAs blockchain processes become more and more a part of our financial lives, people are asking each other...
Latest News
Posts navigation
Posts navigation
Learn a Category: Cyber Threats term
Phishing Awareness Training
What is Phishing Awareness Training? Phishing awareness training is a type of security awareness training designed to teach employees how...
Green Hat Hacker
What is a Green Hat Hacker? The green hat hacker, also known as a newbie, "noob", or a neophyte, is...
Brand Impersonation
What is Brand Impersonation? Brand impersonation (sometimes also called “brandjacking”) is a form of fraud used by cybercriminals to mimic...
- Advanced Persistent Threat
- Brute Force Attack
- Certified Ethical Hacker
- Cloud Access Security Broker
- Code Injection
- Cybercrime
- Cyberforensics
- Cyberthreat
- Distributed Denial of Service
- Gray Hat Hacker
- Keylogger
- Lateral Movement (Cybersecurity Attack)
- Microsegmentation
- Nerd Sniping
- Pegasus
- Ransomware
- Ryuk Ransomware
- Security Breach
- Security Operations Center
- Vulnerability Assessment
Latest Q&A
Q:Why do security professionals consider bitcoin and cryptocurrency mining a potential for 'parasitic' hacker activity?
A: There are a few predominant reasons why experts in cybersecurity will talk about Bitcoin and cryptocurrency mining being...
Q:Why are SQL injection and query string manipulation gaining in cybercrime popularity?
A: SQL injection, along with the related manipulation of query strings, is widely cited as one of the most...
Q:How do the Chrome Store's malicious ad blockers show the duplicity that end users face in cybersecurity?
A: The recent rash of malicious ad blockers dropped from Google's Chrome Store shows how difficult it is to...