Cyberpedia

A M P R S T V
  • Adware

    Adware is one of the most annoying types of malware. It’s name comes from the combination of “Advertisements” and “Malware”. Adware is typically one of the less malicious forms of malware, but it’s still a pain to deal with. Generally, it forces a tremendous amount of advertisements on a computer or device in order to generate…

    Read article →

  • Malware

    The word “Malware” is short for “Malicious Software”. It can be used to refer to many types of malicious software that is installed on a computer. Adware, Trojans, RATs, Worms, Viruses, Ransomware, etc. are a few example types of malware that serve a specific purpose.

    Read article →

  • MFA

    Multi-Factor Authentication (MFA) is the “second step” when signing in that verifies you are who you are. For example, imagine that your passwords are your key to get into a super secret bank vault (just like in the movies). MFA is the piece like the eye scanner or palm reader that sits on the wall…

    Read article →

  • Modem

    Similar to a router, a modem helps you get connected to the internet. The modem allows you to connect to your ISP (Internet Service Provider). Even though most home networks have one device that functions as BOTH a router and a modem, it’s common in advanced setups to have a separate router. In these instances,…

    Read article →

  • Password Vault

    A place you store your passwords, offline or online, so that they’re in a single secured location. A password vault is typically secured by a “master password” and MFA. Some examples of online password vaults include Bitwarden, 1Password, LastPass, Keeper, and Dashlane. Some of them cost money while others (such as Bitwarden) are free. Some…

    Read article →

  • Phishing

    Phishing is when you receive a fake, malicious email with the goal of having you do something you would not intentionally do. Phishing typically comes through email. Other types of social engineering (vishing, smishing, quishing, etc.) come through other methods. Phishing is sometime used as a blanket term to describe all devious behavior like this.…

    Read article →

  • RAT: Remote Access Trojan

    A RAT is a stealthy piece of malware that hides and lets attackers snoop on your machine!

    Read article →

  • Router

    In terms of a home network: A router is the device that allows your home devices to be connected to one another and route to the internet! It typically serves the Wi-Fi out to your wireless devices, but it is also where you would plug the ethernet cords into if you were hardwired. Most home…

    Read article →

  • Smishing

    Smishing is a growing method where attackers send malicious text messages to individuals. Chances are, you’ve gotten quite a few of these. The word “Smishing” is a combination of “SMS” and “Phishing” merged together. Common examples of smishing that you’re probably familiar with include: Malicious links in a text message (scams such as Fedex/USPS/Netflix account…

    Read article →