phising (cybercrime)
phising (cybercrime)
phising (cybercrime)
everyday, incorporating a mix of technical jargon, acronyms, and slang. This article aims
to explain the top 100 hacking terms and slang, providing you with the essential lexicon
to navigate the current cybersecurity landscape.
1. PHISHING
Phishing is a cyberattack that uses disguised email as a weapon. The goal is to trick the
email recipient into believing that the message is something they want or need — for
example, a request from their bank or a note from someone in their company — and to
click a link or download an attachment.
2. MALWARE
3. RANSOMWARE
4. BOTNET
6. EXPLOIT
7. ZERO-DAY
A brute force attack involves trying every possible combination of letters, numbers, and
special characters until the correct password is found. This method relies on the
computational power at the attacker’s disposal and is often used against web
applications to crack passwords and gain access to user accounts.
9. VPN (VIRTUAL PRIVATE NETWORK)
A Virtual Private Network (VPN) extends a private network across a public network,
allowing users to send and receive data across shared or public networks as if their
computing devices were directly connected to the private network. This provides the
benefits of security, functionality, and management policies of the private network.
A Trojan horse, or Trojan, is any malware which misleads users of its true intent. The
term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to
the fall of the city of Troy. Trojans are generally spread by some form of social
engineering, for example, where a user is duped into executing an email attachment
disguised to appear not suspicious.
11. ROOTKIT
13. WHITELISTING
Whitelisting is a cybersecurity strategy under which a user can only take actions on their
computer that an administrator has explicitly allowed in advance. It is the opposite of
more common security strategies that block access to unauthorized or unknown
applications. This can protect against malware by only allowing pre-approved
applications to run.
A black hat hacker is an individual with extensive computer knowledge whose purpose is
to breach or bypass internet security. The black hat hacker is known for hacking into
computer networks with malicious intent, stealing data, corrupting the system, or
shutting it down entirely.
A white hat hacker, also known as an ethical hacker, is a cybersecurity expert who
practices hacking to identify security vulnerabilities that a malicious hacker could
potentially exploit. White hats aim to improve security by exposing weaknesses before
malicious hackers can detect and exploit them.
LEARN MORE ABOUT THE DIFFERENCES BETWEEN WHITE HAT AND BLACK HAT
HACKING
A grey hat hacker lies between a black hat and a white hat hacker. They may exploit
security weaknesses without the owner’s permission or knowledge, but their intentions
are to report the vulnerabilities to the owner, sometimes requesting a small fee to fix
the issue.
17. ENCRYPTION
Encryption is the process of encoding information in such a way that only authorized
parties can access it. By converting the original representation of the information,
known as plaintext, into an alternative form known as ciphertext, encryption prevents
unauthorized individuals from accessing the data.
18. FIREWALL
A firewall is a network security device that monitors incoming and outgoing network
traffic and decides whether to allow or block specific traffic based on a defined set of
security rules. Firewalls have been a first line of defense in network security for over 25
years, establishing a barrier between secured and controlled internal networks that can
be trusted and untrusted outside networks.
19. KEYLOGGER
20. SPOOFING
21. BACKDOOR
23. PATCH
Penetration testing, often called "pen testing," is a simulated cyber attack against your
computer system to check for exploitable vulnerabilities. In the context of web
application security, penetration testing is used to augment a web application firewall
(WAF).
26. SMISHING
Smishing is a deceptive tactic that uses text messaging to lure victims into providing
personal information, such as passwords or credit card details. It combines the terms
"SMS" (short message services) and "phishing" and often directs the recipient to a
fraudulent website or asks them to install malware.
28. SPYWARE
30. VISHING
Vishing, or voice phishing, involves the use of telephone communication to scam the
user into surrendering private information that will be used for identity theft. The
scammer usually pretends to be from a legitimate organization and uses social
engineering to steal sensitive information.
31. WARDRIVING
32. WORM
A computer worm is a type of malware that spreads copies of itself from computer to
computer. A worm can replicate itself without any human interaction, and it does not
need to attach itself to a software program in order to cause damage.
35. DOXXING
36. HONEYPOT
A logic bomb is a piece of code intentionally inserted into a software system that will set
off a malicious function when specified conditions are met. Unlike viruses, logic bombs
do not replicate themselves but can be just as destructive.
38. PHARMING
Root access refers to having the highest level of control over a computer or network. It
allows for the modification of system functionalities and settings, installation of
software, and access to all files on the system. Root access provides complete
administrative control over a wide variety of system functions and files.
Session hijacking, also known as cookie hijacking, is the exploitation of a valid computer
session—sometimes also called a session key—to gain unauthorized access to
information or services in a computer system. This type of attack involves an attacker
stealing a session cookie and using it to impersonate the legitimate user.
Cryptocurrency mining malware covertly utilizes the processing power of the infected
computer to mine cryptocurrency, typically without the user's consent. This type of
malware can significantly degrade system performance, increase electricity costs, and
often serves as a gateway for other malicious activities.
A digital footprint comprises the traces of information that individuals leave online
through activities like visiting websites, posting on social media, or subscribing to online
services. This footprint can reveal a lot about an individual's preferences, behavior, and
identity, making it valuable for both legitimate and malicious actors.
Endpoint Detection and Response (EDR) solutions provide real-time monitoring and
automated response to advanced threats targeting endpoint devices. EDR tools actively
seek out and isolate threats, offering detailed threat analysis and insights to prevent
future attacks.
An evil twin attack involves setting up a fraudulent Wi-Fi access point that mimics the
appearance of a legitimate one to deceive users into connecting. Once connected,
attackers can monitor traffic, capture login credentials, and access sensitive information
transmitted by unsuspecting users
48. FUZZING
49. GHOSTWARE
Ghostware refers to malware that eludes detection by hiding its presence after
executing a malicious activity. This allows the malware to operate or transfer data
without being detected by security software, making it particularly challenging to trace
and eliminate.
RECOMMENDED BY LINKEDIN
50. HASHING
Hashing is a cryptographic process that transforms any form of data into a unique fixed-
size string of characters, which serves as a fingerprint for that data. Unlike encryption,
hashing is a one-way process, making it impossible to reverse the hash back to its
original data, thus ensuring data integrity.
51. INSIDER THREAT
An insider threat arises from individuals within the organization, such as employees,
contractors, or business partners, who misuse their access to harm the organization's
information or systems. Insider threats can manifest through data theft, sabotage, or
misuse of access privileges
52. JAILBREAKING
Kali Linux is a Linux distribution designed for digital forensics and penetration testing. It
comes preloaded with a comprehensive suite of tools for security auditing, network
analysis, and vulnerability assessment, making it a valuable resource for security
professionals.
A macro virus is a type of malware that embeds malicious code within macros of
document files, such as Word or Excel documents. When the infected document is
opened, the macro virus executes, potentially leading to data corruption, file
encryption, or other system disruptions.
Network sniffing involves capturing data packets as they travel across a network.
Attackers use sniffing to intercept and analyze traffic for sensitive information, such as
passwords and financial data, often without detection.
57. OBFUSCATION
58. PIGGYBACKING
59. QUARANTINE
61. SANDBOXING
Social Media Engineering form of cyber manipulation that involves tricking individuals
on social media platforms into divulging confidential information or performing actions
that would compromise their security. This technique leverages the inherent trust and
openness found within social networks.
63. TAILGATING
Information used by an organization to understand the threats that have, will, or are
currently targeting the organization. This data is used to prepare, prevent, and identify
cyber threats looking to take advantage of valuable resources.
A security process in which users provide two different authentication factors to verify
themselves. This method is a more secure way of authenticating because it adds a
second layer of verification beyond just a password.
The process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in
a system. It provides the organization with the necessary knowledge, awareness, and
risk background to understand the threats to its environment and react appropriately.
67. WHALING
A specific form of phishing aimed at senior executives and other high-profile targets
within businesses. The attack may involve social engineering techniques to trick the
victim into performing a detrimental action, such as transferring funds or revealing
sensitive information.
A security concept centered on the belief that organizations should not automatically
trust anything inside or outside its perimeters and instead must verify anything and
everything trying to connect to its systems before granting access.
69. CLICKJACKING
A technique where the attacker tricks a user into clicking on something different from
what the user perceives, potentially revealing confidential information or allowing
others to take control of their computer
The process of monitoring and potentially restricting the flow of information outbound
from one network to another. This can help prevent sensitive data from leaving the
network and block unauthorized access.
72. FIRMWARE
Low-level software that is embedded into the hardware of electronic devices. Firmware
provides the necessary instructions for how the device communicates with other
computer hardware.
73. GRAYWARE
Software that, while not explicitly malicious, can worsen the performance and security
of computers, introduce vulnerabilities, and cause significant annoyances to the user.
A piece of forensic data, such as system log entries or files, that identifies potentially
malicious activity on a system or network. IOCs help security professionals detect data
breaches, malware infections, or other threat activities.
76. JITTERBUGGING
77. KERBEROASTING
In the context of digital circuits, a logic gate is a basic building block of a digital system
that is used to perform a boolean function; in cybersecurity, it can refer metaphorically
to decision points in security protocols or malware.
79. MITIGATION
80. NONCE
A number or bit string used only once, in security engineering, during an authentication
process or cryptographic communication. Nonces prevent old communications from
being reused in replay attacks.
In cybersecurity, a Red Team is a group that plays the role of an adversary, using hacking
techniques to test the effectiveness of a system's security. This practice helps identify
weaknesses before actual attackers can exploit them.
Purple Teaming is a collaborative effort in which the offensive Red Team and defensive
Blue Team work closely together to share insights, feedback, and learning outcomes to
enhance overall security.
A centralized unit that deals with security issues on an organizational and technical
level. A SOC within a building or facility is a central location from where staff supervises
the site, using data processing technology.
Threat Hunting is a proactive search through networks to detect and isolate advanced
threats that evade existing security solutions. This is a sophisticated, information-driven
process that searches for indicators of compromise.
A security feature that automatically disconnects a user from the internet until the VPN
connection is restored. This prevents the user's IP address and personal data from being
exposed due to the sudden drop of the VPN connection.
A security barrier specifically designed to monitor, filter, and block data packets as they
travel to and from a website or web application. It applies a set of rules to an HTTP
conversation, covering common attacks such as cross-site scripting (XSS) and SQL
injection.
A standard defining the format of public key certificates. X.509 certificates are used in
many Internet protocols, including TLS/SSL, which is the basis for HTTPS, the secure
protocol for browsing the web.
An attack that targets a previously unknown vulnerability, for which there is no available
fix or patch at the time of discovery. The attacker exploits the flaw before developers
have an opportunity to address it.
93. ATTRIBUTION
94. BEACONING
The process by which malware communicates back to the attacker to indicate that it has
successfully infiltrated the target system. Beaconing can also be used to receive
commands or exfiltrate data.
In digital forensics, the chronological documentation or paper trail, showing the seizure,
custody, control, transfer, analysis, and disposition of evidence, physical or electronic.
The unauthorized transfer of data from a computer or other device. This can be
conducted manually by an individual or automatically through malicious programming
on the internet or a network.
A string of characters used to encrypt or decrypt data. Keys are used in conjunction with
encryption algorithms to securely encode data, ensuring that only those with the correct
key can access the original information.
The process of examining and analyzing digital information for use as evidence in court.
Cyber forensic analysis involves recovering and investigating material found in digital
devices, often in relation to computer crime.
99. GEOFENCING
A location-based service in which an app or other software uses GPS, RFID, Wi-Fi, or
cellular data to trigger a pre-programmed action when a mobile device or RFID tag
enters or exits a virtual boundary set up around a geographical location, known as a
geofence.
A set of values that guide the behavior of hackers, which includes access to computers—
and anything that might teach you something about the way the world works—should
be unlimited and total. It emphasizes freedom of information, improvement to the
quality of life, and opposition to monopoly by leveraging technology.