BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

Crypto Ransomware

Among the oldest, and traditionally the most common form of ransomware, crypto ransomware works by finding valuable files on a system and applying encryption to them so they become unusable.

2024-11-08T12:00:02+00:00July 26th, 2022|

Cryptography

Cryptography is the science and practice of securing communication and data through the use of mathematical algorithms and protocols. Its primary goal is to protect information from unauthorized access, ensuring confidentiality, integrity, authentication, and non-repudiation in digital communications and transactions. Cryptography has a long history, dating back thousands of years, but in the modern [...]

2024-11-08T12:30:39+00:00March 7th, 2023|

Cryptojacking

Cryptojacking is a type of cybercrime that involves a hacker co-opting a victim’s computing power to generate cryptocurrency on the attacker’s behalf. The motive for these types of attacks is profit, which is usually extremely effective as it is completely hidden from users and difficult to detect. Hackers use this method instead of having [...]

2024-11-08T12:31:25+00:00September 21st, 2022|

Cyber incident

A cyber incident is a cybersecurity event that has compromised an organization's data or systems or that has bypassed the security measures put in place.

2023-03-08T15:36:36+00:00March 8th, 2023|

Cyberattack

A cyberattack is any attempt by cybercriminals to access a computer, computing system or computing network with the intent to steal, expose, alter, disable or destroy information.

2023-03-08T14:05:02+00:00March 8th, 2023|

Cyberespionage

Cyberespionage (preferred) or cyber espionage refers to malicious software used to extract trade secrets or sensitive confidential information from corporations or government for harm (financial, strategic, political) or profit.

2024-11-08T12:52:24+00:00July 19th, 2022|

Cybersecurity

Cybersecurity is the practise of protecting critical systems and sensitive information from cyberattacks through the application of technologies, processes and controls.

2023-03-08T15:38:26+00:00March 8th, 2023|

Cyberwarfare

Cyberwarfare refers to the use of digital attacks, typically by nation-states or state-sponsored groups, to disrupt, damage, or destroy critical infrastructure, steal sensitive information, or influence political or military outcomes. Unlike traditional warfare, which typically involves physical conflict between armed forces, cyberwarfare involves the use of computer networks and digital tools to engage in [...]

2024-11-08T13:22:56+00:00July 6th, 2023|