Revenge Porn

Revenge Porn is sexually explicit images or videos of a person posted online without that person’s consent especially as a form of revenge or harassment. Revenge Porn is typically seen …

Backdoor

A Backdoor in the world of cybersecurity refers to the strategy used to get around normal security measures and gain privileged user access on a computer system, network, or software …

Brute Force Attack

A Brute Force Attack is a strategy used by hackers trying to break into your data, password, or network. In this attack a computer, or its Graphics Processing Unit (GPU) will …

Kill Chain

A Kill Chain in cybersecurity reveals the phases of a cyber attack, from early reconnaissance to the goal of data exfiltration. Kill chains are also used as management tools for …

Passive Attack

A Passive Attack is an actual assault perpetrated by an intentional threat source that attempts to learn or make use of information from a system, but does not attempt to …

trojan horse cybersecurity breaches

Trojan Horse

A Trojan Horse is a computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting …