Catch-all term for malicious software like viruses, spyware, and ransomware. Only download from trusted sources.

Unsolicited bulk messages, usually email. Most inboxes filter spam out automatically.

Tricking people into revealing sensitive info by posing as a trusted entity. Be wary of emails asking you to log in or download attachments.

A Virtual Private Network. Encrypts your internet traffic and masks your IP address for better privacy.

Options to control how your data is collected and used. Review them in your OS, browser, and apps.

An encrypted vault for storing and generating strong passwords. Way better than using the same password everywhere.

Adding random data to a hash to make it harder to crack. A pinch of salt keeps your hash secure!

A digital fingerprint of some data. Used to verify that files haven’t been tampered with.

Exploiting human psychology rather than technical vulnerabilities. Phishing is a prime example.

A vulnerability that’s exploited before the software maker knows about it and can fix it.