It’s a segment of the internet hidden from view, not showing up in search results or accessible through regular web browsers.
Dark Web
dangerous and illegal prank where someone makes a false report of a serious crime, such as a hostage situation or active shooter, in order to send a SWAT team or other law enforcement officers to a targeted location
Swatting
Used to create unique passwords for logins
Password Generator
hackers pretend to be real companies to fool people into sharing private information like personal details, bank account info, and passwords.
Phishing
a software application designed to store and manage online credentials.
Password Manager
makes going online safer and more private by stopping people from seeing who you are, where you are, or what you’re looking at.
VPN
DAILY DOUBLE
When two forms of authentication is used to access an account.
2 FA
provided by search engines to filter out explicit or inappropriate content from search results.
SafeSearch
when someone or something pretends to be something else in an attempt to gain a victim’s confidence, get access to a system, steal data, or spread malware
Spoofing
the fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords or credit card numbers.
Smishing
recreated media of a person’s appearance and/or voice by a type of artificial intelligence called deep learning
Deepfake
collection of practices, technologies, and concepts that shield any Internet-connected software or hardware we use from online threats.
Internet Security
the redirection of web traffic from legitimate sites to a fake sites for the purpose of stealing
Pharming
refers to data that can be used on its own or in conjunction with other information to identify, contact, or locate a single person.
PII
the methods cybercriminals use to get victims to take some sort of questionable action, often involving a breach of security, the sending of money, or giving up private information.
Social Engineering
when a criminal obtains or uses the personal information; e.g. name, login, Social Security number, date of birth, etc., of someone else to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way.
Identity Theft
the act of publishing someone’s personal, confidential information on the internet, often with malicious intent.
Doxxing
form of malware that hides on your device and steals its computing resources in order to mine for valuable online currencies like Bitcoin.
Crypto jacking
take advantage of software vulnerabilities, hidden in the code of the OS and its applications, which cybercriminals use to gain illicit access to your system.
Exploits
when someone takes pictures and information from other people and makes up a fake identity.
Catphishing