Cyber Security term 24: Macro Virus
The Macro Virus is a small piece of code which is lodged into the macros of different documentation and software programs. Such as spreadsheets and […]
The Macro Virus is a small piece of code which is lodged into the macros of different documentation and software programs. Such as spreadsheets and […]
Keylogger is often referred to as a Keystroke logging. A keylogger is a computer program that keeps a log of your keystrokes on your keyboard. […]
IP stands for internet protocol. An IP spoofing or IP Address Forgery is a hijacking technique in which a hacker pretends as a trusted host […]
Identity Theft is sometimes also referred to as Identity Fraud. It involves the unauthorized taking of someone’s personal possessions and then using it in a […]