Copying audio or video data from one format to another, like CD tracks to MP3 files.

Adding random data to a hash to make it harder to crack. A pinch of salt keeps your hash secure!

A digital fingerprint of some data. Used to verify that files haven’t been tampered with.

Exploiting human psychology rather than technical vulnerabilities. Phishing is a prime example.

A vulnerability that’s exploited before the software maker knows about it and can fix it.

Malware that burrows deep into your system to hide itself. Notoriously hard to detect and remove.

Malware that encrypts your files and demands payment for the decryption key. Nasty stuff.

Malware that spies on your computer activity, collecting personal data to send to hackers.

A self-replicating virus that spreads over networks without needing to piggyback on another program.

Malware that spreads by copying itself, like a biological virus. Evolved into more advanced forms: