Category Archives: Blog

Debt Tagging

Debt Tagging
[vc_row][vc_column][vc_column_text] What is debt tagging? Debt tagging describes the wrong person being held responsible for another person’s debt. Debt collectors often use aggressive tactics and may report the outstanding debt to credit bureaus, which results in the victim’s credit record being tagged. How it happens It’s a growing trend among debt-collectors, according to financial experts. […]

Proxy Server

Proxy Server
[vc_row][vc_column][vc_column_text] What is a proxy server? Proxy servers are computer applications or computer systems that act as a go-between or “intermediary” for requests made between a computer or other device and the Internet. How does a proxy server work? Corporate networks are known for their use of proxy servers. Without a proxy server, you may […]

DDos Attack

DDOS Attack
[vc_row][vc_column][vc_column_text] What is a DDoS attack? A Distributed Denial of Service attack – or a DDoS attack – is one that overwhelms the traffic for an online service such as a website by using a variety of sources. Thousands of DDoS attacks occur each day across the world. The facts about DDoS According to TrendMicro […]

Tabnabbing

Tabnabbing
[vc_row][vc_column][vc_column_text] What is tabnabbing? Tabnabbing is considered a specific type of attack where a fake, malicious website will replace a legitimate website already open on a web browser. The goal is to mimic a legitimate site in order to entice a victim to type in a username, password, or other sensitive information. How tabnabbing works […]

Logic Bomb

Logic Bomb
[vc_row][vc_column][vc_column_text] What is a logic bomb? Logic bombs, though different than a computer virus, act in similar ways to execute a dangerous attack like erasing files or an entire hard drive at a specific time when triggered by a specific event. Are logic bombs dangerous? Logic bombs are programs or pieces of a program that can […]

Link Masking

Link Masking
[vc_row][vc_column][vc_column_text] What is link masking? Shortening the URL to a specific website isn’t a new concept, but this method – often referred to as “link masking” – has its pros and cons in the computer security world. Link masking involves taking a lengthy website address and making it shorter. One of the most common services […]

Cyber Attack

Cyber Attack
[vc_row][vc_column][vc_column_text] What is a cyber attack? Cyber attacks are targeted efforts carried out through the Internet in order to spread dangerous programs, steal personal information, or otherwise harm the public, a private business or even a government organization. According to the United States Department of Homeland Security, cyber attacks aren’t always easy to spot and […]

Money Mule

Money Mule
[vc_row][vc_column][vc_column_text] What are money mules? Money mules are people who take stolen money or merchandise and transport it for other criminals. They may be recruited by criminals to take stolen credit card information and use it, but many times they are unaware that what they are doing is part of a crime. They are largely victims […]

Cross Site Scripting – XSS

cross site scripting
[vc_row][vc_column][vc_column_text] What is cross site scripting? Cross site scripting or “XSS” is considered one of the most prevalent vulnerabilities among web applications. It refers to an attack that allows a hacker to carry out dangerous scripts on a legitimate website or application. Essentially, the user of a computer is not the actual targeted victim with […]

Script Kiddie

Script Kiddie
[vc_row][vc_column][vc_column_text] What is a script kiddie? Script kiddie is a term that defines someone who is not necessarily skilled enough to design and carry out their own malicious computer attacks, but who instead relies on scripts or malicious programs created by others to carry out an attack. Often, it is assumed that a script kiddie […]