Adding random data to a hash to make it harder to crack. A pinch of salt keeps your hash secure!
Security,Security Essentials
Attempting to guess a password by systematically trying every possible combination of characters.
Exploiting human psychology rather than technical vulnerabilities. Phishing is a prime example.
A vulnerability that’s exploited before the software maker knows about it and can fix it.
A Distributed Denial of Service attack. When botnets flood a target system to overwhelm and crash it.
Malware that burrows deep into your system to hide itself. Notoriously hard to detect and remove.
Malware that bombards you with unwanted ads. More annoying than dangerous, but still a pain.
Malware that encrypts your files and demands payment for the decryption key. Nasty stuff.
