Brute Force Attack

A Brute Force Attack is a strategy used by hackers trying to break into your data, password, or network. In this attack a computer, or its Graphics Processing Unit (GPU) will …

Countermeasure

A countermeasure in the cybersecurity world, is an action, procedure, or technique that decreases the likelihood of an attack by minimizing either the harm it can cause or the likelihood …

Attack

An Attack is an attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity. In other words, the intentional act of attempting …

Attacker

An Attacker is an individual, group, organization, or government that executes an attack.  Not to be confused with a vulnerability.  An attack in the physical world might be someone who …

Sextortion Explained in 30 Seconds

Cyber Criminals

Cyber Criminals are individuals or teams of people who use technology to commit malicious activities on digital devices or networks with the intention of stealing sensitive company information or personal …

Insider Threat 201

Malicious Code

Malicious Code, or sometimes known as “Attack Code” is a program code intended to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or …

Active Attack

An active attack is an attack on the authentication protocol where the Attacker transmits data to theClaimant, Credential Service Provider, Verifier, or Relaying Party. Examples of active attacks include man-in-the …

Antivirus Software

Antivirus Software is a program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes done by …