BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

Sandboxing

In cybersecurity, sandboxing is a using a test environment, which mimics that of an end-user, to run programs or open files without affecting network, platform or system. This is used to test potentially malicious software.

2023-07-05T15:31:43+01:00July 5th, 2023|

Scareware

Scareware is an evolution of older, social engineering-based attacks that aim to trick users into paying to fix a non-existent problem with their machine.

2022-09-23T21:56:11+01:00July 26th, 2022|

Service Level Agreement (SLA)

A service level agreement (SLA) is part of a contract that sets the expectations between the service provider and the customer and will define and document what services will be provided and the required level or standard for those services.

2023-07-06T08:10:48+01:00July 6th, 2023|

SIEM

Security Information and Event Management (SIEM) is an approach to security management that combines security information management and security event management functions into one centralized security management system.

2023-07-06T08:18:37+01:00July 6th, 2023|

Smishing

Smishing is a form of phishing in which the attacker sends "fake" mobile text messages to trick targeted recipients into downloading malware, sharing sensitive information or sending money to the cybercriminals.

2023-07-06T08:11:22+01:00July 6th, 2023|

Social Engineering Attacks

Social engineering is manipulation technique, relying heavily on human interaction and error to gain access to private information, networks and other valuable assets. These attacks are based around how people think and play on their emotions - when a hacker understands what motivates a user's actions, they can deceive and manipulate them. There are [...]

2022-09-23T21:56:33+01:00September 21st, 2022|

Split Tunneling

Split tunneling allows organizations to divide internet connections into two separate streams. This method will route organization specific data through a VPN tunnel, but routes other traffic through the remote user's default gateway. While split tunneling offers benefits in terms of flexibility and bandwidth efficiency, it also introduces significant security risks. How Split [...]

2024-11-11T12:27:34+00:00July 6th, 2023|

Spoofing

Spoofing is when a threat actor disguises a communication or activity from a malicious source and presents it as from a familiar or trusted source in an attempt to gain the target's confidence, get access to systems, steal data, steal money or spread malware. Spoofing can manifest in various forms, including email spoofing, IP [...]

2024-11-11T12:09:40+00:00March 8th, 2023|

Spyware

Spyware is software that is installed into a computer device, without the end user’s knowledge, in order to gather data and sensitive information and is currently one of the most common threats to internet users. This type of malware infects your PC or mobile in order to gather information including sites you visit, what [...]

2024-11-11T12:02:16+00:00September 21st, 2022|