Word of the Day: Tech Definitions from WhatIs.com:

Security


November 8, 2017  8:56 PM

black hat

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Hacking

Black hat refers to a hacker who breaks into a computer system or network with malicious intent. Continued... Quote of the Day

"Criminal hackers know they must do what they can to test the...

October 23, 2017  4:51 PM

passive reconnaissance

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Hacking

Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the system. Continued… Quote of the Day

"The more...


October 19, 2017  6:02 PM

going dark

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Encryption

Going dark is military lingo for the sudden termination of communication. Continued… Quote of the Day

"In an attempt to rebrand the debate around 'going dark,' Deputy Attorney General Rod Rosenstein...


September 20, 2017  4:45 PM

Fair Credit Reporting Act (FCRA)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
FTC, Identity theft

The Fair Credit Reporting Act (FCRA) is United States federal legislation that promotes accuracy, fairness and privacy for data used by consumer reporting agencies. Continued… Quote of the...


September 8, 2017  8:45 PM

air gapping

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Faraday, malware, security awareness

Air gapping is a security measure that involves isolating a computer or network and preventing it from establishing an external connection. Continued… Quote of the Day

"One of the most effective...


May 25, 2017  3:40 AM

voice signature

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
biometric, Encryption

A voice signature is a type of electronic signature that uses an individual’s recorded verbal agreement in place of a handwritten signature. Continued… Quote of the Day

"Voice has been around...


May 15, 2017  6:26 PM

ransomware

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Encryption, malware, Ransomware

Ransomware is malicious code that is used by cybercriminals to launch data kidnapping and lockscreen attacks. Continued… Quote of the Day

"Ransomware attacks...


May 8, 2017  1:34 AM

Signaling System 7 (SS7)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Networking, Security

Signaling System 7 (SS7) is an international telecommunications standard that defines how network elements in a public switched telephone network (PSTN) exchange information over a digital signaling network.


May 5, 2017  9:00 PM

behavior-based security

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Breach detection, Phishing, Security

Behavior-based security is a proactive approach to managing security incidents that involves monitoring end user devices, networks and servers in order to flag or block suspicious activity. Continued… Quote...


March 24, 2017  8:34 PM

Facebook cloning

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Facebook, Identity theft, Social networking

Facebook cloning is a scam in which the attacker copies the profile picture of an authorized user, creates a new account using that person’s name and sends friend requests to people on the user’s list.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: