No threats found matching your query. Check your spelling or review the Primer.

Botnet

A network of private computers, smart TVs, or internet-connected devices that have been infected with malicious software and controlled as a group without the owners' knowledge. Hackers use botnets to execute massive Distributed Denial of Service (DDoS) attacks or mine cryptocurrency.

Survival Protocol: Isolate critical hardware from the general network. Learn how to build an Air-Gapped Vault →

Brute Force Attack

A trial-and-error method used to decode encrypted data such as passwords. The attacker uses automated software to guess thousands of combinations per second until the correct one grants them access to your accounts.

Survival Protocol: Decentralize your passwords away from standard browsers. Secure your credentials →

Fileless Malware

A type of malicious software that operates exclusively in the computer's active memory (RAM) rather than installing files on the hard drive. Because it leaves no footprint on the physical disk, traditional antivirus scanners often fail to detect its behaviour.

Survival Protocol: Once memory is compromised, data loss is imminent. Rely entirely on Automated Versioned Backups with IDrive →

Keylogger

Spyware that silently records every keystroke made on your keyboard. Attackers use this to steal master passwords, banking PINs, and private communications before the data is even encrypted by your browser.

Survival Protocol: Assume your endpoint is compromised. Audit your defences now. Take the Digital Survival Audit →

Spear Phishing

A highly targeted cyber attack where hackers research an individual (using social media or previous data breaches) and send a customized email posing as a trusted entity. Unlike generic phishing, these emails often include your real name, employer, or partial financial details to manufacture trust.

Survival Protocol: Test your ability to identify threats under pressure. Run the Blackout Simulation →