Cyber Glossary

Learn Cyber :

Learn Cyber : "Steganography"

Steganography is an ancient art of covering messages in a secret way such that only the sender and receiver know the presence of the message. This allows one party to communicate with another party without the third party being aware that communication is occurring. Usually, the data is concealed inside an innocuous cover so that even if a third party discovers the cover, there are no suspicions...

Learn Cyber :

Learn Cyber : "URL Padding"

Security researchers from PhishLabs have come across a new phishing trend that's targeting mobile device owners exclusively, with "the highest proportion of attacks" aimed at Facebook users. This new tactic relies on the fact that mobile browsers have very narrow URL address bars, which prevents users from viewing the entire contents of a link. Phishers are taking advantage of this UI...

Learn Cyber :

Learn Cyber : "Mobile Malware"

Mobile malware is malicious software that is specifically built to attack mobile phone or smartphone systems. These types of malware rely on exploits of particular operating systems (OS) and mobile phone software technology, and represent a significant portion of malware attacks in today’s computing world, where mobile phones are increasingly common. The risks from mobile malware and smartphone...

  • More at MUD
  • |
  • |
Learn Cyber :

Learn Cyber : "Fireball"

After WannaCry Ransomware annihilated hundreds of thousands of computers all around the world, we are witnessing the rise of another dangerous malware campaign named Fireball. Security firm Check Point Threat Intelligence discovered this high volume threat which has infected more than 250 million computers worldwide. Originating from China, this malware has two main powers. It can run any...

Learn Cyber :

Learn Cyber : "Tech Support Scam"

Did you just get a call from a pleasant sounding person with a foreign dialect letting you know that they have detected errors on your computer? They'll even offer to show you what is wrong and 'fix' it for you. You've just become a target and potential victim of a PC Support Scam. This scam is global and has likely bilked millions of dollars out of victims worldwide. The scam has been around for...

Learn Cyber :

Learn Cyber : "EternalBlue"

Leaked NSA tool, an exploit of Microsoft Windows called EternalBlue, was used as one method for rapidly spreading a ransomware variant called WannaCry across the world. The use of the NSA EternalBlue exploit was confirmed by an independent malware researcher known as Kafeine. Kafeine told that it was unsure if the exploit was being used as the ransomware's primary method of infection, but was...

Learn Cyber:

Learn Cyber: "Shadow Apps"

A shadow app is a software program that is not supported by an employee's information technology (IT) department. In the past, shadow apps were often installed locally by impatient employees who wanted immediate access to software without going through normal corporate channels. With the growth of software-as-a-service (SaaS) and cloud computing, however, the meaning has expanded to include...

Learn Cyber:

Learn Cyber: "Dual Biometrics"

A major problem with biometric authentication is that, when it doesn’t work, there are few good options to proceed with the authentication. Some vendors are trying to deal with this by using a simultaneous, multi-biometric method. “Simultaneous” is important because using two methods consecutively would take more time, resulting in end users’ resistance and lower participation rates. Two...

Learn Cyber:

Learn Cyber: "Shadow IT"

It is a term used to describe information technology systems and solutions built and used inside organizations without explicit organizational approval. At one time Shadow IT was limited to unapproved Excel macros and boxes of software employees purchased at office supply stores. It has grown exponentially in recent years. Organizations have guidelines to how new software is introduced to the...

Learn Cyber:

Learn Cyber: "Anonymous Hacker Group"

The decentralized group of international activist hackers has been linked to numerous high-profile incidents over the years, including Internet attacks on governments, major corporations, financial institutions and religious groups. Anonymous gained national attention in 2008, when the group hacked the Church of Scientology Web site with a distributed denial-of-service attack, in which multiple...

Learn Cyber:

Learn Cyber: "Shadow Brokers"

The Shadow Brokers (TSB) is a hacker group who first appeared in the summer of 2016. They claimed responsibility for releasing NSA tools that were used to spread the WannaCry ransomware through the NHS and across the world. They are now threatening to leak a new wave of hacking tools they claim to have stolen from the US National Security Agency. The group also previously published several leaks...

Learn Cyber:

Learn Cyber: "Keychain"

A key chain is a series of keys that can be created to help ensure secure communication between routers in a network. The keychain is a cloud-based security system that keeps all of your passwords and credit card information up-to-date on approved Apple devices. Even Android has released key chain for its smartphones. Key chains can be configured for routing protocols including the Routing...

Learn Cyber:

Learn Cyber: "WannaCry"

It's the name for a prolific hacking attack known as "ransomware," that holds your computer hostage until you pay a ransom. The way it works is that once it infects a computer, it encrypts -- or basically scrambles -- all the data. Then the program puts up a screen demanding you pay money to get access back. Typically the price increases over time until the end of a countdown, when the files are...

  • More at CNet
  • |
  • |
Learn Cyber:

Learn Cyber: "Clickbait"

Alternatively referred to as link bait, clickbait or click bait is a term used to describe a type of hyperlink on a web page that entices a visitor to click to continue reading an article. Typically click bait links will forward the user to a page that requires payment, registration, or is one in a series of pages to help drive page views for the site. Most click bait type links have catchy or...

Learn Cyber :

Learn Cyber : "Open Redirect Vulnerability"

One of the most common and largely overlooked vulnerabilities by web developers is Open Redirect (also known as "Unvalidated Redirects and Forwards"). A website is vulnerable to Open Redirect when parameter values (the portion of URL after "?") in an HTTP GET request allow for information that will redirect a user to a new website without any validation of the target of redirect. Depending on the...

Learn Cyber :

Learn Cyber : "Clickjacking"

Clickjacking, also known as a "UI redress attack", is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top level page. Thus, the attacker is "hijacking" clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both....

  • More at OWASP
  • |
  • |