BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

Split Tunneling

Split tunneling allows organizations to divide internet connections into two separate streams. This method will route organization specific data through a VPN tunnel, but routes other traffic through the remote user's default gateway. While split tunneling offers benefits in terms of flexibility and bandwidth efficiency, it also introduces significant security risks. How Split [...]

2024-11-11T12:27:34+00:00July 6th, 2023|

Spoofing

Spoofing is when a threat actor disguises a communication or activity from a malicious source and presents it as from a familiar or trusted source in an attempt to gain the target's confidence, get access to systems, steal data, steal money or spread malware. Spoofing can manifest in various forms, including email spoofing, IP [...]

2024-11-11T12:09:40+00:00March 8th, 2023|

Spyware

Spyware is software that is installed into a computer device, without the end user’s knowledge, in order to gather data and sensitive information and is currently one of the most common threats to internet users. This type of malware infects your PC or mobile in order to gather information including sites you visit, what [...]

2024-11-11T12:02:16+00:00September 21st, 2022|