Word of the Day: Tech Definitions from WhatIs.com:

Security


October 19, 2017  6:02 PM

going dark

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Encryption

Going dark is military lingo for the sudden termination of communication. Continued… Quote of the Day

"In an attempt to rebrand the debate around 'going dark,' Deputy Attorney General Rod Rosenstein...

September 20, 2017  4:45 PM

Fair Credit Reporting Act (FCRA)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
FTC, Identity theft

The Fair Credit Reporting Act (FCRA) is United States federal legislation that promotes accuracy, fairness and privacy for data used by consumer reporting agencies. Continued… Quote of the...


September 8, 2017  8:45 PM

air gapping

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Faraday, malware, security awareness

Air gapping is a security measure that involves isolating a computer or network and preventing it from establishing an external connection. Continued… Quote of the Day

"One of the most effective...


May 25, 2017  3:40 AM

voice signature

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
biometric, Encryption

A voice signature is a type of electronic signature that uses an individual’s recorded verbal agreement in place of a handwritten signature. Continued… Quote of the Day

"Voice has been around...


May 15, 2017  6:26 PM

ransomware

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Encryption, malware, Ransomware

Ransomware is malicious code that is used by cybercriminals to launch data kidnapping and lockscreen attacks. Continued… Quote of the Day

"Ransomware attacks...


May 8, 2017  1:34 AM

Signaling System 7 (SS7)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Networking, Security

Signaling System 7 (SS7) is an international telecommunications standard that defines how network elements in a public switched telephone network (PSTN) exchange information over a digital signaling network.


May 5, 2017  9:00 PM

behavior-based security

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Breach detection, Phishing, Security

Behavior-based security is a proactive approach to managing security incidents that involves monitoring end user devices, networks and servers in order to flag or block suspicious activity. Continued… Quote...


March 24, 2017  8:34 PM

Facebook cloning

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Facebook, Identity theft, Social networking

Facebook cloning is a scam in which the attacker copies the profile picture of an authorized user, creates a new account using that person’s name and sends friend requests to people on the user’s list.


January 11, 2017  8:06 PM

exploit kit

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
malware, Threat actor

An exploit kit is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware. Continued… Quote of the...


January 6, 2017  11:16 PM

two-factor authentication (2FA)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
2FA, Authentication

Two-factor authentication (2FA) is a security process in which the user provides two authentication factors to verify they are who they say they are. 2FA can be contrasted with single-factor authentication (SFA), a security process in which the user provides only one factor -- typically a password....


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: