Home Security

Security

Top Definitions

Key Fob

Reviewed by Web Webster   A fob, commonly called a key...

PC (Personal Computer)

PC stands for personal computer. PCs are multipurpose computers...

Spyware

(n.) Any software that covertly gathers user information through...

Most Recent

Scrape

Scraping is the process of using automated tools...

Threat Detection

Any person or business that connects to the...

Key Fob

Reviewed by Web Webster   A fob, commonly called a...

Phishing

What is phishing? Phishing is a type of cybercrime...

Retinal Scanning

Retinal scanning is the process of analyzing the...

Whaling

Also known as a whaling phishing attack, whaling...

Cybersecurity Awareness Training

Cybersecurity awareness training informs employees of the attack...

Credentials

A credential is any document or verification that...

DNS Spoofing

Also referred to as DNS cache poisoning, Domain...

POODLE Attack

A POODLE (Padding Oracle on Downgraded Legacy Encryption)...

Threat Intelligence Feed

A threat intelligence feed lists trends in malicious...

East-West Traffic

East-west traffic, or lateral movement, is the passage...