BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z
Wh Wo

Whaling

Whaling is a highly targeted phishing method used by cybercriminals who masquerade as a senior executive in an organization and directly target other senior or important individuals within that organization. The aim is to steal money, access sensitive information or gain access to computer networks and systems. How whaling attacks work The aim [...]

2024-04-18T16:19:15+01:00March 8th, 2023|

Whitelist (Allowlist)

Also known as an allow-list, is a cybersecurity strategy which approves email addresses, IP addresses, domain names or application, denying access to others. Users can only gain access to the whitelisted items.

2022-09-23T21:58:47+01:00September 21st, 2022|

Worm Virus

A worm virus in a malicious program whose primary function is to self replicate, automatically spreading through a network while remaining active on infected systems.

2023-07-05T14:59:00+01:00July 5th, 2023|

Title