top of page
Cyber information Videos
![](https://static.wixstatic.com/media/84441c_b872040d12464f2bbca723ff6be322d2f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_b872040d12464f2bbca723ff6be322d2f000.webp)
![What is a Zero-day exploit?](https://static.wixstatic.com/media/84441c_b872040d12464f2bbca723ff6be322d2f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_b872040d12464f2bbca723ff6be322d2f000.webp)
What is a Zero-day exploit?
A zero-day exploit is a vulnerability in a computer system or software that is unknown to the vendor or the public. This means that the...
1 view
![](https://static.wixstatic.com/media/84441c_e9d68d3ea41146b6b730c15b60d20294f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_e9d68d3ea41146b6b730c15b60d20294f000.webp)
![What is a Worm?](https://static.wixstatic.com/media/84441c_e9d68d3ea41146b6b730c15b60d20294f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_e9d68d3ea41146b6b730c15b60d20294f000.webp)
What is a Worm?
A worm is a type of malware that is designed to spread quickly from one computer to another, often without the user's knowledge or...
1 view
![](https://static.wixstatic.com/media/84441c_b2b641d9697c49079046f0af7bd00a5ef000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_b2b641d9697c49079046f0af7bd00a5ef000.webp)
![What is a computer Virus?](https://static.wixstatic.com/media/84441c_b2b641d9697c49079046f0af7bd00a5ef000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_b2b641d9697c49079046f0af7bd00a5ef000.webp)
What is a computer Virus?
A computer virus is a small program that can copy itself and infect a computer. The virus can spread to other computers by sending out...
0 views
![](https://static.wixstatic.com/media/84441c_b2b641d9697c49079046f0af7bd00a5ef000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_b2b641d9697c49079046f0af7bd00a5ef000.webp)
![What is a Trojan Horse?](https://static.wixstatic.com/media/84441c_b2b641d9697c49079046f0af7bd00a5ef000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_b2b641d9697c49079046f0af7bd00a5ef000.webp)
What is a Trojan Horse?
A Trojan horse is a type of malware that is disguised as a legitimate program or file in order to trick the user into installing it on...
0 views
![](https://static.wixstatic.com/media/84441c_5f8de2a9161b4e4999e3acf571609b34f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_5f8de2a9161b4e4999e3acf571609b34f000.webp)
![What is Spyware?](https://static.wixstatic.com/media/84441c_5f8de2a9161b4e4999e3acf571609b34f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_5f8de2a9161b4e4999e3acf571609b34f000.webp)
What is Spyware?
Spyware is a type of malware that is used to collect information about the user's activities and browsing habits without their knowledge...
3 views
![](https://static.wixstatic.com/media/84441c_86d0683c2c054375a262703e118f9cb1f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_86d0683c2c054375a262703e118f9cb1f000.webp)
![What is Ransomware?](https://static.wixstatic.com/media/84441c_86d0683c2c054375a262703e118f9cb1f000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_86d0683c2c054375a262703e118f9cb1f000.webp)
What is Ransomware?
Ransomware is a type of malware that encrypts the user's files or locks the user's screen until a ransom is paid. The ransom, which is...
2 views
![](https://static.wixstatic.com/media/84441c_3e23243c9d1c4112ae82920d17af72eef000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/84441c_3e23243c9d1c4112ae82920d17af72eef000.webp)
![What is Social Engineering?](https://static.wixstatic.com/media/84441c_3e23243c9d1c4112ae82920d17af72eef000.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/84441c_3e23243c9d1c4112ae82920d17af72eef000.webp)
What is Social Engineering?
Social engineering is a type of attack that is used to exploit the user's trust or lack of knowledge in order to gain access to their...
2 views
bottom of page