T
 
Typosquatting
What it is Typosquatting is when scammers make look-alike websites based on common typing mistakes (like gooogle.com or micr0soft.com). If you mistype a URL or tap a tricky link, you land on the fake site that copies the real one to fool you into ...
 
Trojan.Agent
What it is Trojan.Agent is a generic name security tools use for trojans that hide inside “normal” files or installers. Once you run them, they secretly give an attacker a foothold: downloading more malware, changing settings, or spying on activity. ...
 
Trojan Virus
What it is A trojan is malware that pretends to be something helpful (an app, document, or script) but does something harmful once you run it. Unlike a worm or classic “virus,” a trojan doesn’t spread by itself - it needs you to open or install it. ...
 
Trackware
What it is Trackware is software that watches what you do on a device and sends that info to someone else. It can log the apps you use, sites you visit, searches you make, and basic system details. Some versions come bundled with “free” tools or ...
 
Torrent
What it is A torrent is a tiny descriptor file (with a .torrent extension) that tells a BitTorrent app where to find pieces of a larger download across many peers. Modern clients can also use magnet links, which skip the file and include the info ...
 
Tor
What it is Tor (The Onion Router) is a free tool that hides where you’re coming from online. When you use Tor Browser, your traffic is bounced through several volunteer-run relays before it reaches a website. Each hop only knows the next one, so ...
 
Time Bomb
What it is A time bomb is malware (or a hidden malicious feature) set to go off at a specific date or time. Until that moment, it stays quiet, then runs its payload - deleting files, encrypting data, stealing info, or opening a back door. It’s a ...
 
Tech Support Scam
What it is A tech support scam is when someone pretends to be from a trusted company (Microsoft, Apple, your ISP) to make you believe your computer is “infected” or “blocked.” They use pop-ups, phone calls, or search ads to pressure you into paying ...
 
Third-party Cookie
What it is A third-party cookie is a small tracker set by a site you aren’t visiting directly. For example, a page loads an ad or “Like” button from another company, and that company drops its own cookie in your browser. As you browse other sites ...
 
Threat Landscape
What it is The threat landscape is the big picture of online risks at a given time - the kinds of attacks happening, who’s behind them, and which targets and tricks are most common. It includes everything from phishing and malware to data leaks, ...