An advanced persistent threat is a type of targeted attack. APTs are characterized by an attacker who has time and resources…
Software that uses a variety of techniques to display advertisements on infected computers. Commonly related to or linked to spyware.
A network of private computers, each of which is called a “bot,” infected with malicious software (malware) and controlled as…
A scam in which cybercriminals spoof company email accounts and impersonate executives to try and fool an employee in accounting or HR…
Cybersquatting is the practice of acquiring a site name to attempt to deceive people about the identity of the organization…
A drive-by download is computer code that takes advantage of a software bug in a Web browser to make it…
A type of fraud that targets top executives and administrators, typically to siphon off money from accounts or steal confidential…
also called keylogging and keystroke logging, is the action of tracking (or logging) the keys struck on a computer keyboard;…
Short for malicious software, malware includes viruses, spyware, and other unwanted software that gets installed on your computer or mobile…
Emails are sent to large numbers of users simultaneously in an attempt to “fish” sensitive information by posing as reputable…