An encrypted vault for storing and generating strong passwords. Way better than using the same password everywhere.

An extra login step beyond a password, like a code from an app. Enable it wherever you can!

An extra login step beyond a password, like a code from an app. Enable it wherever you can!

Proving a user’s or device’s identity, usually with a username and password.

Scrambling data so it can only be read with a special key. A must for sensitive info.

Adding random data to a hash to make it harder to crack. A pinch of salt keeps your hash secure!

A digital fingerprint of some data. Used to verify that files haven’t been tampered with.

Attempting to guess a password by systematically trying every possible combination of characters.

Exploiting human psychology rather than technical vulnerabilities. Phishing is a prime example.

A vulnerability that’s exploited before the software maker knows about it and can fix it.