Create an account
How viruses are spread
Email, websites, networks, phishing, hackers, messaging, mobile devices, friends and family
Protect your computer
Anti-virus software, avoid rogue websites, don't open suspicious attachments, etc.
Software that gathers user information through the user's Internet connection without his knowledge.
Phishing & Spoofing
Actions taken through email to falsely gather personal information about the user. Used for identify theft purposes.
The act of obtaining or attempting to obtain secure data by conning individuals into revealing personal information.
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together