Page 22

Index 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
What Is Clickjacking

What Is Clickjacking?

Difficulty: Medium

Clickjacking, also known as a user interface redress attack, or UI redressing, is the practice of using multiple invisible user interface layers to trick users into clicking....

6 Sites You Should Avoid Linking To

6 Sites You Should Avoid Linking To

Difficulty: Medium

Links to external sites are a useful way of providing more information to your visitors, recommending useful sites and services, and providing a better overall user experience since they add more context to readers.

How To Display The Live Date And Time On A Webpage

How To Display The Live Date And Time On A Webpage?

Difficulty: Medium

Displaying the date and time in real time is a very useful feature on a webpage. Below is an example of the live date and time on a webpage using JavaScript and jQuery along with an image of the output.

What Is Cyberstalking

What Is Cyberstalking?

Difficulty: Medium

Cyberstalking is a form of stalking that happens electronically over the internet or on a mobile phone. The anonymity of online communication has made it easy for cyberstalkers to...

What Is Phreaking

What Is Phreaking?

Difficulty: Medium

Phreaking is the act of exploiting vulnerabilities in telephone systems to gain unauthorised access to restricted telephone services or areas, often to obtain free phone calls.

What Is A Digital Footprint

What Is A Digital Footprint?

Difficulty: Medium

A digital footprint is the traces, trails, and records of activity and data an individual or organisation leaves behind whilst using the internet.

What Is A Hacker

What Is A Hacker?

Difficulty: Easy

A hacker is a person that uses their technical skills to gain unauthorised access to computer systems. Hackers can gain unauthorised access to systems in...

What Is Spam

What Is Spam?

Difficulty: Easy

Spam is a form of unsolicited and unwanted online communication sent to an individual or a large number of individuals that can be distributed through email messages, instant messaging sessions...

What Is A Watering Hole Attack

What Is A Watering Hole Attack?

Difficulty: Medium

A watering hole attack is a type of cyberattack where the attacker identifies websites that are commonly visited by members of an organisation and infects them with malware.

What Is An Email Bomb

What Is An Email Bomb?

Difficulty: Medium

An email bomb, also known as a mail bomb, is a type of cyberattack where the attacker sends a large number of email messages to one or more email addresses to flood the mailboxes.

What Is Email Bankruptcy

What Is Email Bankruptcy?

Difficulty: Medium

Email bankruptcy is the process of wiping out, ignoring all emails older than a specific date, or closing an email account, due to an excessively large amount of email messages.

What Is A Potentially Unwanted Program

What Is A Potentially Unwanted Program?

Difficulty: Medium

A potentially unwanted program, also known as a potentially unwanted application, a PUP, a PUA, or junkware, is a type of program that is not strictly malicious, but may be unwanted for the user.

What Is A Technical Support Scam

What Is A Technical Support Scam?

Difficulty: Medium

A technical support scam, often abbreviated to a tech support scam, is a deceptive activity that uses intentional false positives to convince users that their computers have problems when they actually don't.

What Is A Brute-Force Attack

What Is A Brute-Force Attack?

Difficulty: Medium

A brute-force attack is a type of cyberattack where the attacker repeatedly submits large numbers of passwords in the hope of discovering the correct password.

What Is Ciphertext

What Is Ciphertext?

Difficulty: Medium

Ciphertext is text that has been scrambled into random numbers, letters, and symbols by a cipher in order to make it unreadable if intercepted by anyone.

What Is A CAPTCHA

What Is A CAPTCHA?

Difficulty: Medium

Stands for Completely Automated Public Turing Test To Tell Computers And Humans Apart. A CAPTCHA is a security feature designed to prevent spam or abuse from automated bots.

What Is A Browser Hijacker

What Is A Browser Hijacker?

Difficulty: Medium

A browser hijacker is a type of malware that changes a browser's settings, appearance, theme, or behaviour without the user's permission.

What Is A Botnet

What Is A Botnet?

Difficulty: Medium

A botnet is a network of hijacked computers infected with malware that are controlled by a single attacking party to carry out cyberattacks and other malicious activities, like bringing servers down by DDoS attacks.

What Is Catfishing

What Is Catfishing?

Difficulty: Medium

Catfishing is the process of setting up a fake online profile to deceive other people, most commonly on social networking sites and dating sites.

What Is A Logic Bomb

What Is A Logic Bomb?

Difficulty: Medium

A logic bomb is a piece of malicious code designed to carry out instructions when specific conditions are met. Logic bombs can be inserted into malware.

What Is Decryption

What Is Decryption?

Difficulty: Medium

Decryption is the process of converting encrypted information back into its original plaintext form. It is the opposite of encryption.

What Is Shoulder Surfing

What Is Shoulder Surfing?

Difficulty: Easy

Shoulder surfing is the practice of looking over someone's shoulder to steal their sensitive information, including passwords, card numbers, and PIN numbers.

What Is A Drive-By Download

What Is A Drive-By Download?

Difficulty: Medium

A drive-by download is a vulnerability which unknowingly downloads and installs things on a computer without the user's permission or knowledge.

What Is Malvertising

What Is Malvertising?

Difficulty: Medium

Malvertising is the use of online advertising to spread malware or other unwanted software. Malvertisements infect systems with malware by embedding malicious links or code into them.

What Is Pharming

What Is Pharming?

Difficulty: Medium

Pharming is the practice of redirecting a user to a fake website that mimics the appearance of a legitimate one to collect personal information, like usernames, passwords, and bank details.

What Is Social Engineering

What Is Social Engineering?

Difficulty: Medium

Social engineering is the use of deception tactics to get a user to give away their sensitive information, like usernames, passwords, and bank details, which may be used for fraudulent purposes.

What Is Rogue Security Software

What Is Rogue Security Software?

Difficulty: Medium

Rogue security software is a type of malware that tricks users into thinking they have viruses or malware on their computers when they actually don't and misleads them with fake detections and alerts.

What Is Scareware

What Is Scareware?

Difficulty: Medium

Scareware is a type of malware designed to scare users into downloading and installing unwanted and often malicious software that is of little to no use to them.

What Is Two-Factor Authentication

What Is Two-Factor Authentication?

Difficulty: Medium

Two-factor authentication (2FA), also known as two-step verification, or dual-factor authentication, is an electronic authentication method that requires two forms of verification before signing in.

What Is Cyberbullying

What Is Cyberbullying?

Difficulty: Easy

Cyberbullying is a form of bullying that happens electronically over the internet or on a mobile phone. Whilst cyberbullying can take place between...