By |2018-06-14T08:41:56+00:00June 14th, 2018|

A quick “repair job” that resolves issues in IT protection software and/or improves security. A patch can also add new [...]


By |2018-06-14T08:41:25+00:00June 14th, 2018|

An attack on a computer system, particularly if it takes advantage of an existing vulnerability in the operating system, applications, [...]


By |2018-06-14T08:40:50+00:00June 14th, 2018|

Any piece of hardware used to access the internet. If a piece of hardware is able to access the internet [...]


By |2018-06-14T08:39:09+00:00June 14th, 2018|

An activity whereby a cyber-criminal attempts to acquire private or sensitive information – often username/password combinations or credit card details [...]


By |2018-06-14T08:38:34+00:00June 14th, 2018|

A type of Trojan that is usually smuggled into a PC via an email or attachments or download, and launches [...]


By |2018-06-14T08:37:01+00:00June 14th, 2018|

An abbreviation of “malicious software”, malware is any software designed to harm a computer, its software or its users. Malware [...]


By |2018-06-14T08:36:34+00:00June 14th, 2018|

A secret method of bypassing security controls in a computer system. A backdoor may have been built into a system [...]