This popular video conferencing platform faced security scrutiny in early 2020 for privacy and "zoombombing" issues.
Zoom
This feature in browsers lets you browse the web without saving your history or cookies.
Incognito/Private mode
The recommended minimum length for passwords according to NIST guidelines.
8 characters
This browser feature stores website login information so you don't have to re-enter it.
Password manager/Autofill
A malicious program that replicates itself by modifying other programs to include its code.
Virus
This ride-sharing company paid hackers $100,000 to hide a 2016 breach affecting 57 million users.
Uber
This automated program scans the internet looking for vulnerable systems to attack.
Bot
This practice involves removing identifying information from data before sharing or analyzing it.
Anonymization
This technology blocks unwanted or malicious advertisements that might contain malware.
Ad blocker
This malicious software locks your files and demands payment for their release.
Ransomware
This messaging platform owned by Facebook experienced a 2019 vulnerability that allowed spyware installation through a missed call.
A hidden software program that allows someone to remotely control a computer without the owner's knowledge.
Backdoor
This technology prevents unauthorized access to data by making it unreadable without a key.
Encryption
This security indicator appears in your browser when a website uses encryption.
Padlock icon
Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues.
Spyware
This "Internet of Things" device category was used to create the massive Mirai botnet for DDoS attacks in 2016.
Security cameras/Webcams
This term describes software vulnerabilities that are known to the attacker but not yet patched by the developer.
Zero-day
This algorithm generates unique identifiers for files, messages, or passwords to verify integrity.
Hashing
This secure messaging feature ensures even the service provider can't read your conversations.
End-to-end encryption
This type of malicious software hides itself and performs unwanted actions in the background.
Trojan horse
This 2017 ransomware attack affected organizations in over 150 countries and was named after tears.
WannaCry
This type of malware secretly records keystrokes to steal passwords and other sensitive information.
Keylogger
A security mechanism that evaluates real-time factors like location, devices, and user behavior to decide whether to grant or challenge access.
Context-based authentication / context-aware authentication / contextual authentication
A type of cyberattack where an attacker intercepts communication between two parties, pretending to be one of them to steal sensitive information or alter the message.
Man-in-the-middle
Type of software that grants cybercriminals privileged access to a computer system, allowing them to hide their presence and activities.
Rootkit