Category Archives: Blog

Debt Tagging

Debt Tagging
What is debt tagging? Debt tagging describes the wrong person being held responsible for another person’s debt. Debt collectors often use aggressive tactics and may report the outstanding debt to credit bureaus, which results in the victim’s credit record being tagged. How it happens It’s a growing trend among debt-collectors, according to financial experts. With [...]

Proxy Server

Proxy Server
What is a proxy server? Proxy servers are computer applications or computer systems that act as a go-between or “intermediary” for requests made between a computer or other device and the Internet. How does a proxy server work? Corporate networks are known for their use of proxy servers. Without a proxy server, you may not [...]

DDos Attack

DDOS Attack
What is a DDoS attack? A Distributed Denial of Service attack – or a DDoS attack – is one that overwhelms the traffic for an online service such as a website by using a variety of sources. Thousands of DDoS attacks occur each day across the world. The facts about DDoS According to TrendMicro research, [...]

Tabnabbing

Tabnabbing
What is tabnabbing? Tabnabbing is considered a specific type of attack where a fake, malicious website will replace a legitimate website already open on a web browser. The goal is to mimic a legitimate site in order to entice a victim to type in a username, password, or other sensitive information. How tabnabbing works The [...]

Logic Bomb

Logic Bomb
What is a logic bomb? Logic bombs, though different than a computer virus, act in similar ways to execute a dangerous attack like erasing files or an entire hard drive at a specific time when triggered by a specific event. Are logic bombs dangerous? Logic bombs are programs or pieces of a program that can be [...]

Link Masking

Link Masking
What is link masking? Shortening the URL to a specific website isn't a new concept, but this method – often referred to as "link masking" – has its pros and cons in the computer security world. Link masking involves taking a lengthy website address and making it shorter. One of the most common services used [...]

Cyber Attack

Cyber Attack
What is a cyber attack? Cyber attacks are targeted efforts carried out through the Internet in order to spread dangerous programs, steal personal information, or otherwise harm the public, a private business or even a government organization. According to the United States Department of Homeland Security, cyber attacks aren't always easy to spot and stop. [...]

Money Mule

Money Mule
What are money mules? Money mules are people who take stolen money or merchandise and transport it for other criminals. They may be recruited by criminals to take stolen credit card information and use it, but many times they are unaware that what they are doing is part of a crime. They are largely victims in [...]

Script Kiddie

Script Kiddie
What is a script kiddie? Script kiddie is a term that defines someone who is not necessarily skilled enough to design and carry out their own malicious computer attacks, but who instead relies on scripts or malicious programs created by others to carry out an attack. Often, it is assumed that a script kiddie is [...]