Computerhelp4all logo Articles AboutTopicsQuizzesComputer Questions & AnswersComputer Terms & DefinitionsActivitiesContact

Subtopic: Threats To Individuals

Articles about the threats to individuals subtopic.

How To Spot Money Making Scams Online

How To Spot Money-Making Scams Online?

Difficulty: Easy

Money-making scams, also known as 'make money online' scams or 'work at home' scams claim to give a large amount of money for one thing, but don't actually do what they claimed and mislead users of their true intent.

What Is A Fork Bomb

What Is A Fork Bomb?

Difficulty: Medium

A fork bomb, also known as a rabbit virus, is a type of DoS attack where an existing process is taken and continuously replicated to start new processes.

What Is Webcam Hijacking

What Is Webcam Hijacking?

Difficulty: Medium

Webcam hijacking, also known as camfecting, is the act of activating a user's webcam remotely over the internet and gaining access to it without their permission or knowledge.

How To Spot Misinformation Online

How To Spot Misinformation Online?

Difficulty: Medium

Misinformation is false or inaccurate information designed to deceive other people. Since anyone can post something online...

What Is Cryptojacking

What Is Cryptojacking?

Difficulty: Medium

Cryptojacking is the unauthorised use of someone else's computing resources to mine cryptocurrency. Cryptojacking malware often installs...

How To Spot Fake Reviews Online

How To Spot Fake Reviews Online?

Difficulty: Easy

Online reviews are a useful way of seeing what other people think of a product or service before signing up for a subscription or making a purchase.

What Is Spoofing

What Is Spoofing?

Difficulty: Medium

Spoofing is the act of pretending to be something or someone else to deceive other users. This is accomplished by disguising the identity of...

What Is An Internet Troll

What Is An Internet Troll?

Difficulty: Medium

An internet troll is a person online who intentionally causes disruption by posting off-topic, upsetting, controversial, or disturbing content or messages in order to get a reaction out of people.

What Is Clickjacking

What Is Clickjacking?

Difficulty: Medium

Clickjacking, also known as a user interface redress attack, or UI redressing, is the practice of using multiple invisible user interface layers to trick users into clicking....

What Is Cyberstalking

What Is Cyberstalking?

Difficulty: Medium

Cyberstalking is a form of stalking that happens electronically over the internet or on a mobile phone. The anonymity of online communication has made it easy for cyberstalkers to...

What Is Spam

What Is Spam?

Difficulty: Easy

Spam is a form of unsolicited and unwanted online communication sent to an individual or a large number of individuals that can be distributed through email messages, instant messaging sessions...

What Is An Email Bomb

What Is An Email Bomb?

Difficulty: Medium

An email bomb, also known as a mail bomb, is a type of cyberattack where the attacker sends a large number of email messages to one or more email addresses to flood the mailboxes.

What Is A Technical Support Scam

What Is A Technical Support Scam?

Difficulty: Medium

A technical support scam, often abbreviated to a tech support scam, is a deceptive activity that uses intentional false positives to convince users that their computers have problems when they actually don't.

What Is Catfishing

What Is Catfishing?

Difficulty: Medium

Catfishing is the process of setting up a fake online profile to deceive other people, most commonly on social networking sites and dating sites.

What Is Shoulder Surfing

What Is Shoulder Surfing?

Difficulty: Easy

Shoulder surfing is the practice of looking over someone's shoulder to steal their sensitive information, including passwords, card numbers, and PIN numbers.

What Is Pharming

What Is Pharming?

Difficulty: Medium

Pharming is the practice of redirecting a user to a fake website that mimics the appearance of a legitimate one to collect personal information, like usernames, passwords, and bank details.

What Is Social Engineering

What Is Social Engineering?

Difficulty: Medium

Social engineering is the use of deception tactics to get a user to give away their sensitive information, like usernames, passwords, and bank details, which may be used for fraudulent purposes.

What Is Cyberbullying

What Is Cyberbullying?

Difficulty: Easy

Cyberbullying is a form of bullying that happens electronically over the internet or on a mobile phone. Whilst cyberbullying can take place between...

What Is Chain Mail

What Is Chain Mail?

Difficulty: Easy

Chain mail is a type of unsolicited email that is designed to convince the recipient into forwarding the email to other people and making as many copies as possible...

What Is Phishing

What Is Phishing?

Difficulty: Easy

Phishing is the practice of impersonating trusted companies to steal sensitive information from users. Phishing usually comes in the form of email...

What Is A DDoS Attack

What Is A DDoS Attack?

Difficulty: Medium

Stands for a Distributed Denial Of Service Attack. A DDoS attack occurs when an attacker floods a network or server with so much malicious traffic that it...


What Is Computerhelp4all?

Featured Articles

Featured Quizzes

Topics

Subtopics

Activities

Difficulty

Follow Computerhelp4all


Search

Advertisements

Do you need Big Raids in Coin Master? Check out how you do this.

learn backlining