Definition of the Day: Zero Day Exploit
A zero-day exploit is a vulnerability in a software program that is unknown to the company or person who created the software. This hole is
A zero-day exploit is a vulnerability in a software program that is unknown to the company or person who created the software. This hole is
A stealth virus is a type of virus malware that contains sophisticated means of avoiding detection by antivirus software. After it manages to get into
A metamorphic virus is a class of viruses that call to mind the movie ‘Terminator.’ One of the most infectious and complicated viruses, metamorphic viruses
A macro is a set of commands used by a program that perform a set of related actions used commonly. For example, the act of
The term botnet is a portmanteau that combines the words ‘robots’ and ‘network.’ Botnets are a form of illicit distributed computing and are composed of
Baiting is another sibling to phishing. Whereas phishing creates urgency and fear to drive actions baiting uses…well…bait. A baiter entices the target to give information
Piggybacking is a social engineering attack type that gives someone without proper access the ability to gain access to a restricted area, usually by physically
Pretexting is a sibling of phishing and like siblings both have differences as well as similarities. Phishing emails use fear and urgency to drive users
Watering hole attacks were in the news earlier this year (2015) after a Chinese cyber espionage group successfully compromised several major US financial services and
One of the most common stealth attack types is creating a fake wireless access point. This attack is common because it; Leverages people’s desire for
USA
92 Natoma St., Suite 211,
San Francisco, CA USA 94105
Australia
88 Havelock Street, West Perth,
Western Australia 6005
477 Boundary St, Suite 802 | The Johnson
Spring Hill, Brisbane, Queensland 4000
©Copyright 2021 BankVault Pty Ltd. All rights reserved.