A group of compromised computers connected to the internet, which can be used to distribute further attacks, such as DDoS.
A program that attaches itself to a file or program allowing it to spread from one computer to another when opened (unknowingly) by a user.
To avoid being caused, hackers gain access to one computer, then use it to infiltrate another, and so on.
DISTRIBUTED DENIAL OF SERVICE ATTACKS (DDoS)
An attack that floods the targeted network with so many requests that regular traffic to the site is either slowed or completely interrupted.
A phishing technique where a hacker creates a fake but plausible-looking free public Wi-Fi and uses it to steal data.
Amateur hacking for political protests – Anonymous and LubSec are the most famous examples.
Luring users to reveal personal information by masquerading as a trusted source. ‘Spear-phishing’ is ore individually tailored to the intended target.
A hacker who does not know how to infiltrate, but uses malicious code written by others to launch attacks.
A malicious program disguised as something benign, such as a game or antivirus program.
WHITE HAT HACKER
Someone who explores and infiltrates computers and networks intending to improve their security.
Like a virus, it can spread from computer to computer, but does not attach itself to a file or program, meaning it can proliferate without users doing anything.
London lad, loving life and all that it has to offer.