Debit Card

A debit card, also known as a bank card, plastic card, or check card is a payment card that can be used as an alternative to cash when making any purchase transactions. Physically, it looks quite similar to a credit card, however, unlike a credit card, the money is transferred directly from the bank account of cardholders when making a purchase transaction.


Debit Card Fraud

Debit card fraud is any kind of fraud where debit card accounts are accessed by fraudsters without the account owner's authorization in order to manipulate or usually drain their funds. Debit card fraud is quiet easy to commit due to the fact that a debit card's information can be gained with ease.


Dedicated Hosting

A dedicated hosting service, also known as a dedicated server or a managed hosting service, is basically an Internet hosting structure where the customer leases an entire server not shared with anyone else. This is even more flexible when compared to shared hosting, since with dedicated hosting organizations have full access and control over the server(s) and all hardware involved with them.


Dedicated IP

A dedicated IP address is defined as an exclusive Internet address which is exclusively and completely assigned to a distinct hosting account. Only corporate hosting accounts are qualified for dedicated IP addresses. Shared hosting accounts that share the server's IP address cannot have a dedicated IP.


Deep Fake

A technology that overlays a video with different audio or video, in order to make a real-looking video of somebody saying or doing something. A famous example could be a deepfake of Nancy Pelosi (in May 2019) that caught a lot of news attention before being recognized as an authentic-seeming deepfake.


Deep Learning

Deep learning is an artificial intelligence function that imitates the workings of the human brain in processing data and creating patterns for use in decision making. Deep learning is a subset of machine learning in artificial intelligence (AI) that has networks capable of learning unsupervised from data that is unstructured or unlabeled.


Deep Web

The Deep Web, What is it?

The entirety of the web that is not accessible by search engines. Regular browsers, like Google and Bing, search the so-called “surface web", defined by public links, and the search stops there. The "Deep Web" and "Dark Web" are more in-depth, allow for privacy, and serve different purposes. When discussing them, it is important to remember their distinctions, as there are many. 

The "deep" portion of the web is just like it sounds — below the surface and not completely dark. For instance, online banking pages, legal and government documents, or scientific reports have no reason to be indexed. Personal emails and secure information, like bank statements, can also not be searched.  

The dark web represents a sliver of the deep web, and while many of its websites are generally harmless, it is often associated with illegal activities, only accessible via the Tor browser, and such sites can lead to serious consequences.Dark Web vs. Deep Web Inforgraphic


Definition - Data Mining

Data mining is the process of investigating concealed configurations of data rendering at different viewpoints for classifying valuable data, which is gathered and collected in standard zones, such as data warehouses, for effective investigation, data mining systems, assisting the corporate decision-making process plus further data needs in order to finally reduce costs and raise revenue.


Definition - Email Verification

Email verification is a popular method of authentication that will ask a consumer to verify that it is really them trying to make a purchase by sending them an email with a link attached. Clicking on the link allows a business to see that the person making the purchase is someone who can access that email address.


Definition - Gaming

Gaming is defined as the act of playing electronic games, whether by the use of consoles, PCs, cell phones or other intermediate tools. Although gaming is usually an introverted recreation, multiplayer online video games have become a popular hobby.


Definition - Government

The word government refers to a group of people that governs a community or unit. A government sets and administers public policy and exercises executive, political and sovereign power through customs, institutions, and laws within a state.


Definition - ISP Monitoring

ISP monitoring is the practice through which ISPs record information about your online connections and activities. That means that everything from your search history to your email conversations are monitored and logged by your Internet service provider.


Definition - Nonrepudiation

Nonrepudiation is the assurance that somebody can't deny something. Typically, nonrepudiation refers to the ability to ensure that a party of a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated. To repudiate means to deny.


Definition - Phone Verification

It is the process of identifying if a number used by a user is valid or not, as well as if a phone number being used is the phone number of the person trying to use it. Phone number verification is used in different forms of multi-factor authentication.


Definition - Return Fraud

Return fraud is actually an online scam which is committed when a person purchases an item from a retail store without even wanting to use it. For instance, if a person is buying an item just to return it back then it is return fraud and it even expands to the use of duplicate receipts for obtaining money back. It is the act of defrauding a retail store via the return process. There are various ways in which this crime is committed. For example, the offender may return stolen merchandise to secure cash, or steal receipts or receipt tape to enable a falsified return, or to use somebody else's receipt to try to return an item picked up from a store shelf.


Definition - Social Media Intelligence

Social media intelligence refers to the collective tools and solutions that allow organizations to begin conversations, respond to social signals and synthesize social data points into meaningful trends and analysis based on the user's needs.


Definition - Telecommunications

Telecommunications refers to the exchange of information by electronic and electrical means over a significant distance. A complete telecommunication arrangement is made up of two or more stations equipped with transmitter and receiver devices.


Denial of Service Attack (DDoS)

A denial-of-service or DoS is any category of attack in which hackers or attackers endeavor to prevent authentic users from retrieving the service. Within a DoS attack, the hacker or attacker typically sends extreme messages requesting the network or server to validate the requirements that actually have unacceptable arrival addresses, which can overload a system and block even authentic users from being validated to access the service.


Derived Identification

Derived Identification is the term for a unique verification device that is stored within your phone, and is used to identify that a person logging into something or making a purchase has access that phone at that moment. Its primary purpose is simply for authorization purposes, like a kind of multi-factor authentication.


Device Cloning

Device cloning is the practice of producing an accurate copy of any application driver. The term can be used to indicate a body, software design or an application that has roles and behavior related to another body or application driver, however, it does not comprise the real source code of body or the apprehensive program.


Device Emulator

A device emulator is defined as a software or hardware that allows a computer system (named host) to perform as a different computer system (named guest). A device emulator generally allows the host system to use the software or peripheral devices intended for the guest system. This system allows fraudsters to repeat multiple attempts at login, signup or payment with with different parameters so they don’t get blocked, as they make it seem as if a different computer is continuing to attempt the log-ins.


Device fingerprinting

Device fingerprinting is described as a method that is used to forensically recognize an electronical device on the Internet. Device fingerprinting is also able to identify exclusive mobile devices as well as computer devices through their different features with a rational grade of conviction. The device's fingerprints are built with using the collected data on software and hardware used by a website visitor.


Device ID

A device ID or device identification is a unique number related to a cell phone or to the handheld device itself. Device IDs are separate from the hardware serial numbers. It could be a mixture of a number of elements and it is also able to include an inception to allow incomplete advancements.


Device Intelligence

An intelligent device is basically any type of equipment, instrument, or machine that has its own computing capability. The existing grade of intelligent devices is quite wide-ranging, and in addition to personal and handheld computers, the almost infinite list of possible intelligent devices includes cars, medical instruments, geological equipment, and home appliances.