This is the information that comes after the @ symbol in an email address – for example, westmount.com in firstname.lastname@example.org.
Software that is intended to damage or disable computers and computer systems.
The fraudulent practice of sending emails or text messages appearing to be from reputable companies or trusted individuals in an attempt to get individuals to reveal personal information such as passwords and credit card numbers. Phishing attempts are usually urgent-sounding, legitimate looking emails or texts designed to trick you into disclosing personal information or installing a virus on your device. These scams can be sent as attachments or links that, when opened or clicked, may trigger malicious activity or take you to fake sites that resemble real business websites.
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
A program that detects unsolicited and unwanted emails and prevents them from reaching your email inbox. Usually these types of emails are instead sent to a spam folder.
Two-step verification (aka multi-factor authentication)
A method of confirming your identity using a second step to verify who you are. For example, the first step might be to enter your username and password, and the second step might be to enter a randomly generated number sent to you via email, text, phone call, or token.