Revenge Porn

Revenge Porn is sexually explicit images or videos of a person posted online without that person’s consent especially as a form of revenge or harassment. Revenge Porn is typically seen …

February 24th, 2020

Backdoor

A Backdoor in the world of cybersecurity refers to the strategy used to get around normal security measures and gain privileged user access on a computer system, network, or software …

February 12th, 2020

Brute Force Attack

A Brute Force Attack is a strategy used by hackers trying to break into your data, password, or network. In this attack a computer, or its Graphics Processing Unit (GPU) will …

February 7th, 2020

cyber attack iran potential

DHS Warns of Potential Cyber Attacks from Iran

With tensions cooling ever so slightly from the days following Suleimani’s killing, the threat of Cyberattack by Iranian hackers remains a very real threat. Vigilance is still key.

January 14th, 2020

Kill Chain

A Kill Chain in cybersecurity reveals the phases of a cyber attack, from early reconnaissance to the goal of data exfiltration. Kill chains are also used as management tools for …

January 8th, 2020

Passive Attack

A Passive Attack is an actual assault perpetrated by an intentional threat source that attempts to learn or make use of information from a system, but does not attempt to …

December 24th, 2019

trojan horse cybersecurity breaches

Trojan Horse

A Trojan Horse is a computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting …

December 18th, 2019