...Ransomware? Extortion software is on the rise. Find out what ransomware is and how you can protect yourself from it.All about ransomware
...a VPN? Surfing the web anonymously? It's possible! A VPN software encrypts your internet connection.Be safe from espionage
...the Darknet? There is a part of the Internet that is not easily accessible to everyone.Hidden network
... the Cloud? Storing and sharing your data in the cloud? Here’s what’s important for you to know.In the clouds
... a Firewall This controls the data stream between a computer and the data network (internal and external).Protective wall against malware
... a Botnet? Botnets are used for carrying out attacks such as DDoS attacks or sending spam email.Malicious PC networks
... a Hoax? Hoax is the specialist term for bogus warnings or for some types of fearmongering.Fake warning messages
... a zombie PC? Zombies are found on the Internet as well as on TV. But a zombie PC is a real threat.Digital zombies
... a virus scanner? Virus scanners use so-called signatures – a type of template – to go hunting for malware.Hunting for malware
... social engineering? This term describes the process of persuading a victim to give up information.Non-technical attacks on users
... a Rootkit? Rootkit refers to software tools that try to disguise malicious processes and files.Stealth for malware
Secure online banking Read our hints and tips for online transfers and the like.Tips for your security
Travelling securely without cyber stress Cyber risks are lurking even when you are on holiday. We explain how you can protect yourself on the move.Secure on holiday