This is a program that protects your PC against spyware and helps to keep your computer and personal details secure.
Browser software provides you with the means to view a webpage. Without browser software, you would not be able to surf the Internet.
This is a collection of information, usually including a username and the current date and time, stored on the local computer of a person using the Internet. It is used by websites to identify users who have previously registered or visited the site.
Encryption converts data into an encoded form before it is sent over the Internet. This prevents unauthorised access to the information. At RMB Private Bank, we use 128-bit Secure Socket Layer (SSL) encryption to secure your information.
Any of a number of security schemes that prevent unauthorised users from gaining access to a computer network or that monitors transfers of information to and from the network or personal computer.
This is the crime of obtaining the personal or financial information of another person for the purpose of assuming that person's name to make transactions or purchases.
This involves the capturing of information that you type on the keyboard by installed hardware. This is often used by fraudsters to capture personal details including passwords.
This is a protocol that provides a high level of security for communication over the Internet.
Unsolicited email, often of a commercial nature, sent indiscriminately to multiple mailing lists or individuals.
This is software that secretly gathers information about a user while they navigate the internet. This information is normally used for advertising purposes. Spyware can also gather information about email addresses and even passwords and credit card numbers.
This is a program that disguises itself as another program. Similar to a virus, these programs are hidden and cause an unwanted effect. They differ from viruses because they are normally not designed to replicate like a virus.
A computer virus is a piece of code that is secretly introduced into a system in order to corrupt it or destroy data. Often viruses are hidden in other programs or documents and when opened, the virus is let loose.
This is a special type of virus that spreads without any user interaction, typically by exploiting a flaw in popular software.