An email bomb or “mail bomb” is a malicious act in which a large number of email messages […]
Category Archive: What is
This category is designed to explain the concept of any specific idea.
“Salami Slicing Attack” or “Salami Fraud” is a technique by which Cyber-criminals steal money or resources a bit […]
DoS attacks can be divided into two general categories—application layer attacks and network layer attacks. Each of these […]
A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service […]
Logic Bomb is a set of instructions secretly incorporated into a program so that if a particular condition […]
Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain unauthorized access. A […]
Stalking is unwanted obsessive attention to a specific person. Physical stalking can involve following, secret surveillance, persistent and […]
Identity theft, also called identity fraud, use of an individual’s personally identifying information by someone else (often a […]
The simplest definition is “Cyber-bullying is bullying with the use of digital technologies”. Cyber-bullying takes place over digital […]
Phishing is a Cyber-attack where attackers trick users into doing something that is harmful to the victim in […]
Why is Cyber security important all of a sudden? We are living in a far more technologically advanced […]