Business email compromise (BEC, man-in-the-email attack)

A business email compromise (BEC) is a type of cyberattack in which an attacker compromises a business email account in order to defraud the company or its employees. The attacker will typically use the account to send spoofed emails that appear to be from the legitimate account holder, in order to trick the recipient into … Read more


Scareware is a type of malware that uses fear or other emotional triggers to convince users to take a desired action, such as buying a product, clicking on a link, or downloading a file. The action may be to install malware, visit a malicious website, or provide personal information. Scareware is often spread through phishing … Read more

Friendly virus

As the name suggests, a friendly virus is a type of computer virus that is not harmful to your computer or its data. In fact, some friendly viruses may even be beneficial, such as those that perform useful tasks like backing up files or removing other viruses. However, even friendly viruses can cause problems if … Read more

Cyber resilience

Cyber resilience is the ability of an organization to withstand and recover from a cyber attack. It includes the ability to detect, respond to, and recover from an attack, as well as the ability to reduce the risk of future attacks. Organizations that are cyber resilient are able to continue operating in the face of … Read more

Port 9875 (port of doom)

The port of doom is a nickname given to the computer network port number 9875. The port is often used by malicious software to spread itself or to launch attacks on other computers. It is also sometimes used by legitimate programs for legitimate purposes, such as for remote administration. What port number is 7777? Port … Read more


In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. How do you … Read more

Retina scan

A retina scan is an image of the blood vessels in the back of your eye. It’s used as a form of biometric identification, like a fingerprint or iris scan. The retina is the innermost layer of the eye, and it’s full of blood vessels. When light hits the retina, those blood vessels create a … Read more

PCI forensic investigator program

A PCI forensic investigator program is a software program that helps organizations investigate and analyze potential PCI security breaches. The program provides a centralized platform for collecting and analyzing data from multiple sources, including network traffic data, application logs, and database records. It also includes tools for visualizing data and for identifying patterns and trends. … Read more

Mobile security (wireless security)

Mobile security, also known as wireless security, is the protection of portable electronic devices such as laptops, smartphones, and tablets from unauthorized access and malicious software. Mobile devices are often used to store sensitive data such as corporate email, financial information, and personal photos and videos. These devices are also frequently used to access corporate … Read more

Security theater

The term “security theater” refers to security measures that are implemented primarily for the purpose of creating an appearance of security, rather than providing actual security. These measures may make people feel more secure, but they do not actually provide any meaningful increase in security. In some cases, security theater can even decrease security, by … Read more