Malware disguised as legitimate software. Named after the famed Trojan Horse.
Catch-all term for malicious software like viruses, spyware, and ransomware. Only download from trusted sources.
Tricking people into revealing sensitive info by posing as a trusted entity. Be wary of emails asking you to log in or download attachments.
A Virtual Private Network. Encrypts your internet traffic and masks your IP address for better privacy.
Options to control how your data is collected and used. Review them in your OS, browser, and apps.
An encrypted vault for storing and generating strong passwords. Way better than using the same password everywhere.
Having multiple paths for data to travel. Helps maintain connectivity if one path fails.
The percentage of data packets that get lost in transit. Can noticeably degrade voice and video quality.
