We know a virus is bad. And we know malware is bad. But what’s the difference between the two? We explain it in our simple-to-understand jargon buster. While the two terms are often used interchangeably, malware and virus have different meanings, though it is true that you want neither on your computer. Malware stands for […]
Jargon Buster
What is Two Factor Authentication and why is it important?
It’s more important than ever to make sure all your important online accounts are as secure as they can be. And one of the most effective steps you can take to secure those accounts is through two factor authentication. Crooks have a variety of scams up their sleeves designed to tricking you into parting with […]
What is a remote code execution (RCE) vulnerability?
Here we discuss what a remote code execution vulnerability is, how it works and why they are do dangerous. The developers of the software you use – for example your operating system, word processor or your Internet browser – are always on the lookout for software bugs. Those software bugs include software vulnerabilities that could […]
What is a phishing scam? Jargon buster
Our jargon buster section moves to phishing. What is it, what does it mean and how do you make sure you don’t fall for such a scam? A phishing scam is a broad term used to refer to any scam where a cyber-crook contacts a victim pretending to be someone they are not in order […]
Zero Day Vulnerabilities, Patches & Exploits. Jargon Buster
When you see a typical computer security headline such as “exploit targets zero-day vulnerability in Chrome. Patch now!” pop up on your screen, you may not understand some of the terminology. It’s not as complicated as it sounds once those definitions are explained in plain English. Our jargon buster helps put these terms into context. […]