Quantcast
Channel: FAQ Archives - ThatsNonsense.com
Browsing all 25 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

There’s no such thing as a “Trojan Worm Virus”; Your malware cheat sheet

We explain the various different types of malware and how they work. When we see breathless posts warning about malware spread across social media, they invariably demonstrate that the author – and...

View Article



Image may be NSFW.
Clik here to view.

How Facebook decides what appears in your newsfeed

As a result of quite a lot of confusion over the Facebook newsfeed and how Facebook chooses what posts and content appear in your newsfeed, we explain all, simply, in this FAQ. A number of posts claim...

View Article

Image may be NSFW.
Clik here to view.

Why do some Facebook posts no longer have the Share option? FAQS

Facebook users have noticed that the Share option doesn’t appear on many of the posts made by their friends. We take a look as to why. Before, it seems like we could share any post made by our friends....

View Article

Image may be NSFW.
Clik here to view.

Does Facebook sell your data to advertisers? Fact Check

In a 5 hour open session with US Congress this week, Facebook CEO Mark Zuckerberg was answering questions about security, privacy and other social media related issues. The questions coming from US...

View Article

Image may be NSFW.
Clik here to view.

Can Facebook apps “hack” your account?

One question we are often asked is can Facebook apps can “hack” your Facebook account? So here we explain what Facebook apps can and cannot do and go over some important security advice. When the...

View Article


Image may be NSFW.
Clik here to view.

What’s the difference between a targeted and untargeted attack?

When discussing cyber-attacks, you may hear us and others refer to targeted, or untargeted, when describing the type of attack. But what do the two terms actually mean? We describe how each attack can...

View Article

Image may be NSFW.
Clik here to view.

What is a credential stuffing attack? Explained…

We discuss what credential stuffing is, how it works and how you can avoid this type of Internet attack. Most will know that to log into your account on many websites or apps, you most likely need your...

View Article

Image may be NSFW.
Clik here to view.

What is the difference between phishing and spear-phishing?

We discuss the differences between phishing scams and spear-phishing scams. A phishing scam is an attempt by a criminal to obtain sensitive information from a victim by pretending to be an entity that...

View Article


Image may be NSFW.
Clik here to view.

What does WWG1WGA mean and what is it associated with?

This particular acronym is most likely going to accompany breathless social media or forum posts that are promoting conspiracy theories. That is because WWG1WGA is an acronym of an unofficial motto of...

View Article


Image may be NSFW.
Clik here to view.

What was the first ever computer virus and what did it do?

Today, computer viruses and other forms of malware are one of the biggest threats we face online, costing users and businesses billions of dollars every year and the loss of countless files. Malware...

View Article

Image may be NSFW.
Clik here to view.

Here’s how to quickly check which photos of you are public on Facebook

We discuss how to check what photos you’re tagged in that have wide open privacy settings and why you should consider removing those tags, or even better, persuading the uploader to sort out their...

View Article

Image may be NSFW.
Clik here to view.

The difference between page followers and likes on Facebook

Page admins may have noticed that they have both a like count and a follow count. On the flip side, those on a Facebook page may have noticed they can either like or follow the page. We explain the...

View Article

Image may be NSFW.
Clik here to view.

5 popular myths about hacking and hackers

If movies are to be believed, computer hackers are socially awkward teenagers living in darkened basements, their skin lit up with the glow from the several monitors that surround them, each adorned...

View Article


Image may be NSFW.
Clik here to view.

Ransomware explained. What it is and how to remove it.

Ransomware is one of the most prolific types of malware threats facing both businesses and individuals, in part due to its success in making the cyber criminals who develop it substantial amounts of...

View Article

What does HTTP and HTTPS actually mean? A Beginner’s Guide

Last updated on March 8th, 2021Have you ever found yourself wondering what the HTTPS at the start of a web address actually means? And didn’t it use to just be HTTP? We explain all. When you look at...

View Article


What is Ransomware-as-a-Service? (RaaS)

With an estimated two thirds of ransomware attacks being linked to Ransomware-as-a-Service, we discuss what this means. When you want some extra cloud storage to save your photos, you may purchase a...

View Article

I got a suspicious text or email from a bank I don’t use. Why?

If you’re a regular user of text or email, and you probably are, you’ve most likely at some point received a text or email from a bank that you don’t have an account with. Most likely the message asked...

View Article


The rise of “extortionware” and how it differs from ransomware

The Cybersecurity landscape is shifting dramatically, as organised cyber-attacks on businesses and other large entities are increasing in frequency and ambition. Ransom pay-outs are getting bigger, and...

View Article

Image may be NSFW.
Clik here to view.

How to stop Google keeping record of your search history

In the murky depths of cyberspace, there is always someone recording your online activity. It’s the price we pay for receiving free access to so many different services that we’ve come to take for...

View Article

What is End-to-End Encryption?

We discuss what end-to-end encryption is, how it works and what it means to you, the user. We often hear the term end-to-end encryption (often abbreviated to E2EE), especially in relation to the...

View Article
Browsing all 25 articles
Browse latest View live




Latest Images