Security Incidents
Basic Security Terminology
Digital Identity & Data Protection
Online Safety
Malware Types
100

This popular video conferencing platform faced security scrutiny in early 2020 for privacy and "zoombombing" issues.

Zoom

100

This feature in browsers lets you browse the web without saving your history or cookies.

Incognito/Private mode

100

The recommended minimum length for passwords according to NIST guidelines.

8 characters

100

This browser feature stores website login information so you don't have to re-enter it.

Password manager/Autofill

100

A malicious program that replicates itself by modifying other programs to include its code.

Virus

200

This ride-sharing company paid hackers $100,000 to hide a 2016 breach affecting 57 million users.

Uber

200

This automated program scans the internet looking for vulnerable systems to attack.

Bot

200

This practice involves removing identifying information from data before sharing or analyzing it.

Anonymization

200

This technology blocks unwanted or malicious advertisements that might contain malware.

Ad blocker

200

This malicious software locks your files and demands payment for their release.

Ransomware

300

This messaging platform owned by Facebook experienced a 2019 vulnerability that allowed spyware installation through a missed call.

WhatsApp

300

A hidden software program that allows someone to remotely control a computer without the owner's knowledge.

Backdoor

300

This technology prevents unauthorized access to data by making it unreadable without a key.

Encryption

300

This security indicator appears in your browser when a website uses encryption.

Padlock icon

300

Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues.

Spyware

400

This "Internet of Things" device category was used to create the massive Mirai botnet for DDoS attacks in 2016.

Security cameras/Webcams

400

This term describes software vulnerabilities that are known to the attacker but not yet patched by the developer.

Zero-day

400

This algorithm generates unique identifiers for files, messages, or passwords to verify integrity.

Hashing

400

This secure messaging feature ensures even the service provider can't read your conversations.

End-to-end encryption

400

This type of malicious software hides itself and performs unwanted actions in the background.

Trojan horse

500

This 2017 ransomware attack affected organizations in over 150 countries and was named after tears.

WannaCry

500

This type of malware secretly records keystrokes to steal passwords and other sensitive information.

Keylogger

500

A security mechanism that evaluates real-time factors like location, devices, and user behavior to decide whether to grant or challenge access.

Context-based authentication / context-aware authentication / contextual authentication

500

A type of cyberattack where an attacker intercepts communication between two parties, pretending to be one of them to steal sensitive information or alter the message.

Man-in-the-middle

500

Type of software that grants cybercriminals privileged access to a computer system, allowing them to hide their presence and activities.

Rootkit