Malware that spies on your computer activity, collecting personal data to send to hackers.

Malware that encrypts your files and demands payment for the decryption key. Nasty stuff.

Tricking people into revealing sensitive info by posing as a trusted entity. Be wary of emails asking you to log in or download attachments.

Unsolicited bulk messages, usually email. Most inboxes filter spam out automatically.

Catch-all term for malicious software like viruses, spyware, and ransomware. Only download from trusted sources.

Malware disguised as legitimate software. Named after the famed Trojan Horse.

An extra login step beyond a password, like a code from an app. Enable it wherever you can!

An encrypted vault for storing and generating strong passwords. Way better than using the same password everywhere.

Options to control how your data is collected and used. Review them in your OS, browser, and apps.

A Virtual Private Network. Encrypts your internet traffic and masks your IP address for better privacy.