Category Archives: Blog

Email Bomb

Email Bomb
[vc_row][vc_column][vc_column_text] What’s an email bomb? In the world of computers and networks, a “mail bomb” or “email bomb” is a system that floods a particular email inbox or email server with messages – enough to possibly overload the system and cause it to stop working properly. How does an email bomb work? Multiple ways of […]

Check Kiting

Check Kiting
[vc_row][vc_column][vc_column_text] What is Check Kiting? Check kiting is a popular form of fraud that allows a person to take advantage of non-existent money in a bank account by using bad or “hot” checks as a form of unauthorized credit. How does it work? Kiting can leave a large amount of damage to a financial institution, […]

Pharming

Pharming
[vc_row][vc_column][vc_column_text] What is Pharming? In the cyber world, Pharming is a fraudulent method identity thieves use to redirect a user to a bogus website in order to get personal information. Victims won’t even necessarily know what has happened. How pharming works Pharming occurs through Domain Name System (DNS) “poisoning.” In this type of attack, a domain […]

Scareware

Scareware
[vc_row][vc_column][vc_column_text] What is Scareware? The threat of your computer being infected with “scareware” is no Halloween joke. Scareware is a dangerous computer program that tricks or scares a user into paying for a useless product or downloading a malicious program such as malware. Scareware has been called many other names including fraudware, deception software, and […]

Ransomware

Ransomware
[vc_row][vc_column][vc_column_text] What is Ransomware? Like the name implies, “ransomware” is essentially a malicious program that allows your computer or server to be sabotaged and held at ransom, while cybercriminals demand you do something for them in order for you to regain access. Often, hackers demand money under the threat that they will erase everything you’ve […]

Honeypot

Honeypot

What’s a Honeypot? Honeypots are a form of web security used to detect, deflect, or gather information about unauthorized use. Keeping your computer systems safe may require the use of deception, and a honeypot may be just the key. How do they work? In a sense, a honeypot is a decoy, sort of like a […]

Hacker

Hacker
[vc_row][vc_column][vc_column_text] What is a Hacker? If your identity has been stolen online or if you hear stories in the news about others who have been victimized by cybercriminals, there’s a good chance you’ve seen or heard the word “hacker.” But do you know what or who a hacker really is? A hacker is anyone who […]