Login

Airo Library

We're happy to help. You might not be the first to ask. Take a look at our FAQ for
some of our most popular answers.

Search Our Library
Adware
A software, application, browser extension, program or general behavior with the sole purpose or function of generating ad revenues (in any form), including by disrupting your Mac experience and/or hijacking your browser’s search functionality.
Helpful? Yes | No
Thank you for your feedback
Sorry to hear that, please contact us using this form for further help
Blockchain
A Block-chain is a data structure that defines a distributed ledger. It can be used to record transactions between two parties efficiently, in a verifiable and permanent way, and without the need of a central authority.
Helpful? Yes | No
Thank you for your feedback
Sorry to hear that, please contact us using this form for further help
Cryptocurrency
Cryptocurrency is digital money secured by cryptography that enables anonymous transactions. And by ‘digital’ we mean, no physical representation like bills and coins. In fact, each digital currency is identified by a serial number, which is used as a key. Unlike the physical money we know and love, fully centralized and regulated by governmental and financial institutes, cryptocurrency is a decentralized currency. Meaning there is no central supervising authority.
Helpful? Yes | No
Thank you for your feedback
Sorry to hear that, please contact us using this form for further help
Cryptocurrency Malware
A software, application, script, program or general behavior with sole intention to mine cryptocurrency without your knowledge, awareness or consent. Anybody digging into your system, using your CPU and memory, in order to generate profit for their own monetary benefit.
Name:

Filter 1
Range:

A1:J16
Comment resolved




A software, application, script, program or general behavior with sole intention to mine cryptocurrency without your knowledge, awareness or consent. Anybody digging into your system, using your CPU and memory, in order to generate profit for their own monetary benefit.
Helpful? Yes | No
Thank you for your feedback
Sorry to hear that, please contact us using this form for further help
Crypro Mining
Usually refers to The act of "mining" a block in the block chain done to validation of transactions. For this effort, successful miners obtain new cryptocurrency as a reward" (notice that this is true from some concurrency that rewards miners based on "Prof of work", there are other methods).
Helpful? Yes | No
Thank you for your feedback
Sorry to hear that, please contact us using this form for further help
GateKeeper
Gatekeeper was introduced in macOS 10.7.5 and provides users more control over what they install on their Mac. They can choose to allow only apps from the Mac App Store or allow apps from the Mac App Store as well as identified developers.
Helpful? Yes | No
Thank you for your feedback
Sorry to hear that, please contact us using this form for further help
Keylogging
Keystroke logging often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program.
Helpful? Yes | No
Thank you for your feedback
Sorry to hear that, please contact us using this form for further help
Malvertising
Malvertising ("malicious advertising") is the use of any online advertising format to spread malware. It typically involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and web pages.
Helpful? Yes | No
Thank you for your feedback
Sorry to hear that, please contact us using this form for further help
Malware
A software, application, script, program, file or general behavior with malicious intent to harm your Mac, your browser, your accounts or data. This category is broad and comprises viruses, worms, Trojan horses, spyware and ransomware. This includes different forms of hacking, hijacking or monitoring of your activity without legitimate purpose and/or your permission, and exploiting any vulnerability to attack.
Helpful? Yes | No
Thank you for your feedback
Sorry to hear that, please contact us using this form for further help
Phishing (or: Social Engineering)
Phishing, also known as social engineering, refers to the manipulation of people into performing actions or divulging confidential or sensitive information.
Helpful? Yes | No
Thank you for your feedback
Sorry to hear that, please contact us using this form for further help
Ransomware
A type of malicious software that threatens to publish or otherwise misuse your data by perpetually blocking your access to your Mac, browser or files, until a ransom is paid.
Helpful? Yes | No
Thank you for your feedback
Sorry to hear that, please contact us using this form for further help
Spyware
A type of software, application, program, file, script or general behavior with the sole purpose to spy on you, your actions, steal your data or just collect sensitive information without your awareness or consent.
Helpful? Yes | No
Thank you for your feedback
Sorry to hear that, please contact us using this form for further help
Zero-day Exploit
Zero-day is a flaw in a software (or hardware) that is unknown to the party responsible for patching or otherwise fixing the flaw. Until the vulnerability is fixed, hackers can exploit it to adversely affect computer programs, data or a network.
Helpful? Yes | No
Thank you for your feedback
Sorry to hear that, please contact us using this form for further help

Teach Us!

If you believe you can contribute to any of the topics here with more information, examples, and descriptions, we would love to have your contribution

Submit here