Malicious software designed to damage or disrupt a computer system, or steal information.
Malware
A string of characters used to verify the identity of a user during the authentication process
Password
A student is looking for a pair of expensive sneakers and stumbles upon a website offering them at a price way below market value. The website looks slightly off, but the student, eager for a deal, enters their payment information. After the transaction, the shoes never arrive, and the website disappears.
Scam
A type of malware that locks users out of their device or encrypts their files, demanding payment to restore access.
Ransomware
A security method that requires two different forms of identification to access resources or data
Two-Factor Authentication
A student receives an email offering a scholarship that seems like a perfect fit. The scholarship asks for personal details like Social Security numbers and an upfront fee to process the application. In reality, this is a scam designed to steal identity information and money from unsuspecting students.
Scam
Deliberate deception for financial or personal gain.
Fraud
What is the first thing to do when you suspect somebody is spying on you when online?
Shut the device down
Imagine you find a free game that looks fun and download it from a random website, not from a trusted app store. The game works, but behind the scenes, it installs spyware on your device. The spyware quietly tracks everything you do—your texts, your social media logins, and even your online shopping passwords. You might not even notice, but your personal information could be sent to hackers who use it for identity theft or sell it on the dark web.
Spyware
A type of malware that replicates itself and spreads from one device to another, often damaging systems.
How to avoid Scholarship Scams?
Be suspicious of upfront payment requests.
Any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
Malware
A fraudulent attempt to steal sensitive information, such as passwords or credit card numbers, by pretending to be a trustworthy entity.
Phishing
How to avoid Online Shopping Scam?
Research unknown websites.
Somebody stole your online information and is making you pay to get it back.
Ransomware