Phishing

Home/Tag:Phishing

Trusted Platform Module (TPM)

2020-09-02T05:37:26+00:00Categories: Computer & Network Concepts|Tags: , , , , , , , , , , , , , , , , , , , |

TPM stands for trusted platform module. TPM also called is ISO/IEC 11889. TPM is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. A TPM is actually a microchip on the motherboard of most servers and even today's clients. The main function of TPM is to [...]

What’s DLP?

2020-08-24T08:51:40+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , |

Data loss refers to an event in which important data is lost to the enterprise, such as in a ransomware attack. Data loss prevention (DLP) focuses on preventing illicit transfer of data outside organizational boundaries. Data loss prevention is a set of tools and processes used to ensure that sensitive data is not lost, misused, [...]

What’s Cryptojacking?

2020-09-26T06:03:53+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , |

Cryptojacking is an online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” forms of online money known as cryptocurrencies. Cryptojacking also called malicious cryptomining. In fact, the core idea behind cryptojacking is that hackers use business and personal computer and device resources to do their mining work [...]

Go to Top