Search Results for:
Shoulder surfing
Shoulder surfing is when crooks keep tabs on you to steal your details to compromise your accounts, get access to …
Threat model
Threat modeling is a practice of working through the possible bad things that could affect the assets you consider valuable …
Sensitive personal data
Sensitive personal data is information about a person like their religious beliefs that could be used to treat them differently. …
Personal information
Personal information (PI) is an umbrella term that covers personal and sensitive details about you someone could use to describe, …
Ciphertext
When you encrypt plaintext like email messages, photos, documents, videos, music and more, you get ciphertext which scrambles information into …
Cryptography
If you’d like to hide the photos of your favorite cat or the email you sent to Santa, cryptography turns …
Decryption
Decryption lets you unscramble and reveal information that’s been hidden using encryption. It does this using algorithms and a key …
Encryption
Encryption lets you hide information from prying eyes so that messages, files or devices can only be unlocked with a …