Cybersecurity Resource Center

Learn about the main cyber threats, malware, hacking and how to protect yourself from cybercrime.

Everything you need to know about cybersecurity basics

Cybersecurity is the practice of protecting devices, networks, and systems from digital attacks, theft, and damage. It involves the use of technologies, processes and policies to secure systems, networks, and devices from cyber threats.

The world of cybersecurity is always changing. When viruses first appeared, most of them were pranks. To stay safe online, one of the best things you can do is stay educated on the litany of threats that lurk on the web. Use this information hub to learn everything you need to know about cyberthreats, and how to stop them.

Start learning about the cybersecurity basics here.

Antivirus Icon

Antivirus

What’s the difference between antivirus and anti-malware protection? Both refer to cybersecurity software, but what do these terms mean, and how do they relate to today’s online digital threats?

Malware Icon

Malware

Malware, or malicious software, is a blanket term for any kind of computer software with malicious intent. Most online threats are some form of malware.

Ransomware Icon

Ransomware

Ransomware is an emerging form of malware that locks the user out of their files or their device, then demands an anonymous online payment to restore access.

Adware Icon

Adware

Adware is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your behavior online so it can target you with specific ads.

Spyware Icon

Spyware

Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information like bank details and passwords.

Hacker Icon

Hacker

Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. Hackers are motivated by personal gain, to make a statement, or just because they can.

Phishing Icon

Phishing

Phishing is a method of tricking you into sharing passwords, credit card numbers, and other sensitive information by posing as a trusted institution in an email or phone call.

Data Breach

Data Breach

A data breach comes as a result of a cyberattack that allows cybercriminals to gain unauthorized access to a computer system or network and steal the private, sensitive, or confidential personal and financial data of the customers or users contained within.

Android antivirus

2 FA

Two-factor authentication (2FA) offers a two-step process for your authentication, making protection of your online accounts more secure.

Trojan Icon

 Trojan

Trojans are programs that claim to perform one function but actually do another, typically malicious. Trojans can take the form of attachments, downloads, and fake videos/programs.

Mac antivirus Icon

AI in cybersecurity

AI, short for Artificial Intelligence, involves various techniques and algorithms that enable computers to analyze data, make decisions, and perform tasks that typically require human intelligence, leading to advancements in cyber security, while also creating risks.  

Emotet Icon

 Emotet

Emotet is a kind of malware originally designed as a banking Trojan aimed at stealing financial data, but it’s evolved to become a major threat to users everywhere.

Keylogger Icon

 Keylogger

Keyloggers secretly record what you see, say and do on your computer. Employers use keyloggers to watch employees, but cybercriminals use them too.

DDoS Icon

 DDoS

DDoS is a malicious network attack in which hackers overwhelm a website or service with false web traffic or requests from numerous enslaved Internet-connected devices.

Spam Icon

 Spam

Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. And it’s more than a nuisance. Spam today is a serious threat.

SQL injection Icon

What is authentication

Authentication is the process of verifying the identity of a user, device, or system. It is a cyber security method used to ensure that the person or entity attempting to access a resource is authorized to do so. 

Spoofing Icon

 Spoofing

Spoofing is when someone or something pretends to be something else in an attempt to gain a victim’s confidence, get access to a system, steal data, or spread malware.

Cryptojacking Icon

 Cryptojacking

Cryptojacking is a form of malware that hides on your device and steals its computing resources in order to mine for valuable online currencies like Bitcoin.

Scam call Icon

Catfishing

Catfishing (also referred to as catphishing)  is when someone takes pictures and information from other people and makes up a fake identity.

Exploits Icon

 Exploits

Exploits take advantage of software vulnerabilities, hidden in the code of the OS and its applications, which cybercriminals use to gain illicit access to your system.

Malvertising Icon

Doxxing

Doxxing comes from the term “dropping documents”, and is the act of publishing someone’s personal, confidential information on the internet, often with malicious intent.

Backdoor Icon

Incognito Mode

Learning how to use Incognito mode certainly has its benefits on a shared computer. With private browsing mode, you can covertly shop for a gift for a loved one, research sensitive topics that you wish to keep private from people at home or keep your funny cat video viewing habits a secret.

Identity theft

 Identity theft

Identity theft occurs when a criminal obtains or uses the personal information; e.g. name, login, Social Security number, date of birth, etc., of someone else to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way.

Computer virus

 Computer virus

A computer virus is malware attached to another program (such as a document), which can replicate and spread after an initial execution on a target system where human interaction is required. Many viruses are harmful and can destroy data, slow down system resources, and log keystrokes.

GandCrab Icon

Dark Web

The dark web might sound like a mysterious part of the internet, and in many ways, it is. It’s a segment of the internet hidden from view, not showing up in search results or accessible through regular web browsers.

VPN Icon

 What is VPN

A VPN, or virtual private network, is a secure connection between people and devices over the Internet. A VPN makes going online safer and more private by stopping people from seeing who you are, where you are, or what you’re looking at.

Social engineering

 Social engineering

Social engineering refers to the methods cybercriminals use to get victims to take some sort of questionable action, often involving a breach of security, the sending of money, or giving up private information.

Password manager

 Password manager

A password manager is a software application designed to store and manage online credentials. Usually, these passwords are stored in an encrypted database and locked behind a master password.

What is EDR?

Password Generator

What is a strong password? How can you generate a password that is unique and impossible to crack. Use our Password Generator tool.

What is EDR?

 Pharming

Pharming involves the redirection of web traffic from legitimate sites to a fake sites for the purpose of stealing usernames, passwords, financial data, and other personal information.

Ryuk ransomware

Deepfakes

A “deepfake” refers to recreated media of a person’s appearance and/or voice by a type of artificial intelligence called deep learning (hence the name, deepfake).

Trickbot Icon

 Trickbot

TrickBot is a banking Trojan that can steal financial details, account credentials, and personally identifiable information (PII), as well as spread within a network and drop ransomware, particularly Ryuk.

Phishing

Phishing is when hackers pretend to be real companies to fool people into sharing private information like personal details, bank account info, and passwords. Once they get this info, they can steal the person’s identity or money.

Internet Security

Internet security is the collection of practices, technologies, and concepts that shield any Internet-connected software or hardware we use from online threats. 

PII (Personally identifiable information)

PII, refers to data that can be used on its own or in conjunction with other information to identify, contact, or locate a single person. This includes direct identifiers like social security numbers and email addresses, which can uniquely identify a person.

SafeSearch

SafeSearch is a feature provided by search engines  to filter out explicit or inappropriate content from search results. It helps create a safer browsing experience by blocking or hiding potentially offensive or explicit images, videos, and websites. 

Smishing

The term “smishing” may sound silly, but the smishing meaning is less amusing than it sounds. A smishing attack is a type of phishing attack that leverages text messages as an attack vector.

Swatting

Swatting is a dangerous and illegal prank where someone makes a false report of a serious crime, such as a hostage situation or active shooter, in order to send a SWAT team or other law enforcement officers to a targeted location.

Protect your digital footprint

How can you check your digital footprint? Is your digital footprint permanent? How can you monitor dark web for exposure? How to protect your privacy online:

state of malware
Malwarebytes shield, video game controller, graduation cap

Learn about Internet safety and privacy

Don’t let malware and other cyberthreats ruin your day. Stay one step ahead of the cybercriminals with our tips, tricks, and guides for staying safe, having fun, and getting things done online.

Try Malwarebytes