a type of malware that opens a permanent “back door” into a computer system; once installed, a rootkit will allow…
An alternative form of phishing that occurs via text or SMS message.
The use of psychological manipulation to trick people into divulging confidential information or providing access to funds. The art of…
SPAM is the use of electronic messaging systems (email) to send unsolicited bulk messages (usually advertising or other irrelevant posts)…
The targeting of specific companies or individuals, using hand-crafted messages meant to trick them into divulging personal or confidential data for…
Spyware is a type of malware (malicious software) installed on computers that collects information about users without their knowledge; can…
A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control…
An unsolicited browser change occurs when a Web site or program changes the behavior or settings of the Web browser…
A software program that is designed to replicate itself, spread from one computer to another, and interfere with computer operation;…
A computer worm is a type of virus that replicates itself, but does not alter any files on your machine.…