Category Archives: Blog

Jailbreaking

Jailbreaking
What is jailbreaking? Jailbreaking is the removal of restrictions that are set on various devices, such as those on an electronic tablet or smartphone. Jailbreaking a device allows a user to unlock and install applications and make other changes not necessarily approved by the manufacturer of the software. How does it work? Because jailbreaking involves [...]

Vishing

Vishing
What is Vishing? Though you may have never heard of the term vishing, there's a good chance you've been targeted by this very criminal activity. Vishing attacks rely on a phone network to steal your money and other personal information. The word "vishing" is a combination of "voice" and "phishing," the online scam aimed at [...]

Koobface

Koobface
What is Koobface? Back in 2008, messages sent through popular social media programs and through major email websites became infected with malware that came to be known as the Koobface virus. Koobface is a virus used to target Windows, Mac and Linux operating platforms intended to infect your computer with malware. How does Koobface work? [...]

SEO Poisoning

SEO Poisoning
What is SEO Poisoning? Search poisoning, or SEO poisoning, is the use of search engine optimization tactics to make a dangerous website appear legitimate and prominent in results of an online search. What is SEO and how does SEO poisoning work? Search Engine Optimization is a method of using certain keywords or other signals that will [...]

Two-Factor Authentication

Two Factor Authentication
What is two-factor authentication? Also known as "2FA" or "TFA," two-factor authentication is considered an added layer of protection that requires a username and password, along with a second method of verifying your identity, such as a fingerprint, retina scan, bank card or even a smartphone application. How does two-factor authentication work? Simply relying on [...]

Data Encryption

Data Encryption
What is data encryption? The encryption of data is a method of altering electronic information into a form that allows only authorized users to read or understand what is being sent. In theory, data encryption prevents anyone who sees the information from being able to understand it and use it for criminal purposes such as [...]

Keylogger

Keylogger
What is a keylogger? Keystroke logger – also known as a "keylogger" – is when every keystroke you make on your computer is tracked and recorded, usually without your authorization or knowledge that it's happening. The dangers of keyloggers Criminals bent on stealing your identity can do so easily when they know everything you've ever [...]