BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z
Wh Wo

Whaling

Whaling is a highly targeted phishing method used by cybercriminals who masquerade as a senior executive in an organization and directly target other senior or important individuals within that organization. The aim is to steal money, access sensitive information or gain access to computer networks and systems. How whaling works The aim of [...]

2024-10-14T13:47:15+01:00March 8th, 2023|

Whitelist (Allowlist)

Also known as an allow-list, is a cybersecurity strategy which approves email addresses, IP addresses, domain names or application, denying access to others. Users can only gain access to the whitelisted items.

2024-10-14T13:43:58+01:00September 21st, 2022|

Worm Virus

A worm virus, known more commonly as a “worm” is a malicious program whose primary function is to self-replicate, automatically spreading through a network, without human intervention, while remaining active on infected systems. Worms can cause significant damage to both systems and networks.

2024-10-14T13:36:07+01:00July 5th, 2023|