BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z
Vi Vu

Virtual Private Network (VPN)

A virtual private network (VPN) is a service that provides a secure internet connection by creating an encrypted "tunnel" for your data, protecting your online identity by hiding your IP address and allowing you to use public Wi-Fi safely. People use VPNs when using public Wi-Fi regularly, if they want to access home content [...]

2024-10-10T12:19:51+01:00September 21st, 2022|

Virus

CISA defines a virus as a malicious program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself. A virus infecting devices or networks can often lead to detrimental effects, including data corruption, unauthorized access, and system instability. Unlike other [...]

2024-10-10T12:13:15+01:00July 6th, 2023|

Vishing

Vishing is short for "voice phishing," a type of cyberattack which involves fraudulent use of phone calls or voice messages to steal confidential information from victims. How Vishing Works Vishing involves an attacker impersonating a legitimate, usually trusted, entity, such as a bank, government agency or trusted authority. The goal of the attacker [...]

2024-10-09T16:35:24+01:00July 6th, 2023|

Vulnerability

In cybersecurity, a vulnerability is a weakness or flaw in an IT system, application or network that can be exploited by an attacker to gain unauthorized access, disrupt operations, or compromise data integrity. Vulnerabilities can exist in various forms, including software bugs, misconfigurations, or insufficient security measures, and they pose significant risks to organizations [...]

2024-10-14T13:51:03+01:00March 8th, 2023|