R
RFID
Tags that use radio frequencies to search, identify and track items and people, and can also store and transmit personal data. RFID blockers can preve...
Robocalls
A phone call generated by a computer rather than an actual person, which can be used for spam campaigns.
Ransomware
Malicious software that encrypts all contents on the device and requires the user to pay a ransom to retrieve their data.
