• Showing 51-100 of 423 items
  • <<
  • 1
  • 2
  • 3
  • ...
  • 9
  • >>
  1. How to Protect Your Data From Being Hacked

    Identity theft and credit card fraud can happen to anyone. Use these tips to help keep your personal information safe.
  2. Know the Latest IRS Scams

    How do IRS scammers go about stealing your personal information? Their methods include hacking, malicious software and psychological ...
  3. How Much Can Facebook Potentially Make from Selling Your Data?

    How much does Facebook stand to make by selling user data? Hard to be sure since they will never tell, but we try to extrapolate ...
  4. Delivery Versus Payment (DVP)

    Delivery versus payment is a securities industry settlement procedure in which the buyer's payment for securities is due ...
  5. Social Networking Service (SNS)

    A social networking service (SNS) is an online vehicle for creating relationships with other people who share an interest, ...
  6. Cambridge Analytica

    Cambridge Analytica is the firm that allegedly misused users' data from Facebook and other platforms to influence political ...
  7. Gray Box

    Gray box is the testing of software with limited knowledge of its internal workings.
  8. Intrusion Detection System (IDS)

    An Intrusion Detection System (IDS) is a computer program that detects security threats by monitoring the trail of activities ...
  9. Aggregation

    Aggregation is a principal involving the combination of all future positions owned or controlled by a single trader or group ...
  10. Denial Of Service Attack (DoS)

    A Denial Of Service Attack (DoS) is an intentional cyberattack carried out on networks, websites and online resources to ...
  11. Online Banking

    Online banking is the performance of banking activities via the Internet.
  12. Data Breach

    A data breach is an unauthorized access and retrieval of sensitive information by an individual, group, or software system.
  13. Advanced Persistent Threats (APT)

    An Advanced Persistent Threat (APT) is a large-scale, sophisticated, targeted attack on an organization’s computers to gather ...
  14. Hacktivism

    Hacktivism is a social or political activist plan that is carried out by breaking into and wreaking havoc on a secure computer ...
  15. Dark Web

    The dark web refers to encrypted online content that is not indexed on conventional search engines.
  16. HIPAA Waiver of Authorization

    A HIPAA waiver of authorization is a legal document that allows an individual’s health information to be used or disclosed ...
  17. Zero Day Attack

    Zero Day Attack is an attack that exploits a potentially serious software security weakness that the vendor or developer ...
  18. Hard Fork

    A hard fork (or sometimes hardfork) is a radical change to the protocol that makes previously invalid blocks/transactions ...
  19. Cloud Computing

    Cloud computing is a model for delivering information technology services; resources are retrieved from the internet through ...
  20. Accounting Information System - AIS

    An accounting information system is the collection, storage and processing of financial and accounting data that is used ...
  21. Errors And Omissions Insurance - E&O

    Errors and omissions insurance is a professional liability insurance that protects companies & individuals against claims ...
  22. Keyboard Logger

    A keyboard logger is hardware or software that records every keystroke on a computer, usually for nefarious purposes and ...
  23. Honeypot

    A honeypot is a security measure used to prevent and dismantle cyberattacks by luring attackers to a specific area of a computer ...
  24. Threat Modeling

    Threat modeling is evaluating what needs to be protected in the area of computer security, then determining what steps to ...
  25. Supply Chain Attack

    A supply chain attack is a cyberattack that attempts to inflict damage to a company by exploiting vulnerabilities in its ...
  26. Ransomware

    Ransomware is a cyber-extortion tactic that uses malicious software to hold a user’s computer system hostage until a ransom ...
  27. Cloud Security

    Cloud security is the protection of data stored online from theft, leakage and deletion.
  28. Computer Abuse

    Computer abuse is the use of a computer to do something improper or illegal.
  29. Disaster Recovery Site

    A disaster recovery site, also known as a backup site, is a place that a company can temporarily relocate to following a ...
  30. Botnet

    A botnet is a network of internet-connected devices that have been compromised by hackers without the knowledge of the legitimate ...
  31. Cybersecurity

    Cybersecurity refers to the measures taken to keep electronic information private, ranging from personal protection to complex ...
  32. Bring Your Own Device (BYOD)

    Bring Your Own Device (BYOD) is a company policy that allows employees to use their personal mobile devices and laptops for ...
  33. Cloud Hijacking

    Cloud hijacking is the breaking into or taking over of the cloud account of an individual, business or other organization ...
  34. Eavesdropping Attack

    An eavesdropping attack is an incursion where someone tries to steal information that computers, smartphones, or other devices ...
  35. Macro Virus

    A macro virus infects a software program and causes a series of actions to begin automatically when the program is opened.
  36. Cyber Identity

    Cyber identity refers to the personality or personalities that are created through a person’s online interactions.
  37. Data Migration

    Data migration is the process of moving stored digital information between computers, systems or formats.
  38. De-Anonymization

    De-anonymization is a reverse data mining technique that re-identifies encrypted information.
  39. Behavioral Analytics

    Behavioral analytics is a sector of data analytics geared toward providing insight into the actions of human beings.
  40. Personally Identifiable Information (PII)

    Personally Identifiable Information (PII) is information that, when used alone or with other relevant data, can identify ...
  41. Passwords Are Obsolete, Get With the Blockchain

    Blockchain technology could provide a better alternative to memorizing long, confusing, and easily forgotten passwords.
  42. Enterprise Information Management (EIM)

    Enterprise information management refers to the optimization, storage and processing of data created and used by a large ...
  43. Ethereum Smart Contracts Vulnerable to Hacks: $4 Million in Ether at Risk

    About 34,200 Ethereum smart contracts worth $4.4 million in ether are vulnerable to hacking, according to a new report.
  44. CoinDash: Ethereum Hacker Returned 20,000 Stolen Ether Worth $17 Million

    A hacker quietly returned 20,000 ethereum tokens to CoinDash after stealing them during the company's ICO. Why?
  45. Choosing the Right Day-Trading Software

    Software has made day trading quick and automatic. How to choose the best for your needs.
  46. Debit Card Fraud: Is Your Money At Risk?

    Find out how your money is becoming more vulnerable to debit card fraud by criminals and hackers. Use these nine easy ways ...
  47. Introduction To Accounting Information Systems

    Learn what an accounting information system is and the six main parts of this indispensable business asset for managing a ...
  48. Tesla’s Cloud Was Hacked for Mining Cryptocurrency

    Tesla claims that customer privacy and vehicle safety weren't compromised during the attack.
  49. Boiler And Machinery (BM) Insurance

    Boiler And Machinery Insurance (BM) provides coverage for physical damage to and financial loss from equipment breakdown.
  50. What Is the Dark Net?

    The Dark Net (or Darknet) is a subset of secret websites that exist on an encrypted network.
  • Showing 51-100 of 423 items
  • <<
  • 1
  • 2
  • 3
  • ...
  • 9
  • >>
Hot Definitions
  1. Business Cycle

    The business cycle describes the rise and fall in production output of goods and services in an economy. Business cycles ...
  2. Futures Contract

    An agreement to buy or sell the underlying commodity or asset at a specific price at a future date.
  3. Yield Curve

    A yield curve is a line that plots the interest rates, at a set point in time, of bonds having equal credit quality, but ...
  4. Portfolio

    A portfolio is a grouping of financial assets such as stocks, bonds and cash equivalents, also their mutual, exchange-traded ...
  5. Gross Profit

    Gross profit is the profit a company makes after deducting the costs of making and selling its products, or the costs of ...
  6. Diversification

    Diversification is the strategy of investing in a variety of securities in order to lower the risk involved with putting ...
Trading Center