Conduct that uses a computer in order to obtain money, property, or value dishonestly, or to cause loss.
Person who invades someone else's computer for personal gain or just for personal satisfaction.
Scrambling a message so that no one else can read it.
Verifying your identity through a username and password or biometrics.
A virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.
A virus that does something different from what it is expected to do.
A program that has been written, usually by a hacker, to cause the corruption of data on a computer.
Act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft
Any software that secretly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes
A virus that makes copies of itself.
Short for malicious software
A system designed to prevent unauthorized access to or from a computer or a private network
Please allow access to your computer’s microphone to use Voice Recording.
We can’t access your microphone!
Click the icon above to update your browser permissions above and try again
Reload the page to try again!
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Your microphone is muted
For help fixing this issue, see this FAQ.