{"id":872,"date":"2021-09-22T12:18:00","date_gmt":"2021-09-22T12:18:00","guid":{"rendered":"https:\/\/dev.cryptoloc.au\/?p=872"},"modified":"2023-10-03T06:18:35","modified_gmt":"2023-10-03T06:18:35","slug":"decoded-cybercrime-jargon-explained","status":"publish","type":"post","link":"https:\/\/127.0.0.1\/decoded-cybercrime-jargon-explained\/","title":{"rendered":"Decoded: Cybercrime jargon explained"},"content":{"rendered":"\n

Can\u2019t tell your malware from malarkey? Do you think phishing is something you do with your mates on the weekend? If you\u2019re sick of just smiling and nodding politely when the subject turns to cybercrime, you\u2019re in luck \u2013 we\u2019ve broken down the meanings of the most common cybercrime terms here.<\/p>\n\n\n\n

Account harvesting<\/strong>: Collecting email accounts that are in the public domain or using software to collect email addresses that are stored on a computer. These accounts are often used later for spamming. <\/p>\n\n\n\n

Attack surface<\/strong>: The sum of the different points in a system that an attacker could potentially breach. Your attack surface is essentially your digital footprint, and the larger it is, the more chances there are that an attacker could find exploitable vulnerabilities in it. <\/p>\n\n\n\n

Back door<\/strong>: A means to access a system that bypasses the normal security measures. Back doors are sometimes created deliberately by developers as a troubleshooting tool, and sometimes installed as part of a cyber attack by criminals who return to exploit it later.<\/p>\n\n\n\n

Black hat<\/strong>: A person who hacks into a computer system with malicious intent. Bad guys. <\/p>\n\n\n\n

Browser hijacking<\/strong>: Software that can modify a user\u2019s browser settings without their knowledge or consent, often to inject unwanted content or advertising. <\/p>\n\n\n\n

Brute force<\/strong>: A process of attempting to crack a cryptographic key or password by systematically trying every possible combination until you find the right one. <\/p>\n\n\n\n

Business email compromise<\/strong>: When criminals use email fraud to target business, government and non-profit organisations. This can include impersonating businesses by using similar names and domains, or even impersonating specific co-workers by compromising their email accounts. From here, the criminal can raise false invoices or change banking details so that money is sent to their account, among other scams.<\/p>\n\n\n\n

BYOD (Bring Your Own Device)<\/strong>: An IT policy that allows employees to access a business\u2019 systems and data using their own personal tablets, computers and phones, broadening that business\u2019 attack surface. <\/p>\n\n\n\n

Countermeasure<\/strong>: Techniques, actions and procedures to minimise the threat of a cyberattack by using cyber security and other measures. <\/p>\n\n\n\n

Cryptographic key<\/strong>: <\/strong>A string of seemingly random characters that, when processed through a  cryptographic algorithm, can encrypt data to make it unreadable ciphertext, or decrypt it to make it plaintext. Just like a physical key, it\u2019s used to ensure that only the people in possession of it can lock and unlock data. <\/p>\n\n\n\n

Dark web<\/strong>: The dark web contains websites that aren\u2019t indexed by search engines, and are only accessible through specialised browsers and software. The dark web can be used for highly illegal activity, including extoring ransomware payments, by users who wish to remain anonymous. <\/p>\n\n\n\n

Data at rest<\/strong>: Data that\u2019s stored in any digital form on a computer. <\/p>\n\n\n\n

Data in transit<\/strong>: Data that\u2019s moving between locations, either through the internet or a private network. <\/p>\n\n\n\n

Denial-of-service (DoS) attack<\/strong>: A DoS attack crashes a user\u2019s system or network, making it completely unusable. This is usually done by overloading the system with requests. <\/p>\n\n\n\n

Double extortion<\/strong>: A similar process to ransomware (see below), but the hacker will also threaten to publish the data publicly if the ransom is not paid. <\/p>\n\n\n\n

Encryption<\/strong>: The conversion of readable plaintext data into unreadable cyphertext. A strong security measure against cyber attacks, it makes data virtually useless to anyone who accesses it without the cryptographic key required to unlock it.  <\/p>\n\n\n\n

Firewall<\/strong>: A computer security system that filters incoming and outgoing network traffic based on certain security rules. Firewalls are intended to prevent unauthorised users from accessing the network, although there are ways for attackers to bypass them<\/a>.  <\/p>\n\n\n\n

Grey hat<\/strong>: A hacker who uncovers security flaws using illegal or unethical means, usually without the owner of the system\u2019s knowledge or consent. However, they don\u2019t have the malicious intent of a \u2018black hat\u2019 hacker. Morally ambiguous guys. <\/p>\n\n\n\n

Incident Response Plan<\/strong>: A set of instructions on how to deal with a cyber security issue including preparation, detection, response and recovery. <\/p>\n\n\n\n

Keystroke logger<\/strong>: Software that covertly records and captures the keystrokes on a computer without the knowledge of the user. This can be used to collect confidential information, including banking logins and other sensitive passwords. <\/p>\n\n\n\n

Malvertising<\/strong>: Short for \u2018malicious advertising\u2019, it\u2019s the injection of malicious software that can be used to gain unauthorised access to systems into legitimate advertising networks and pages. <\/p>\n\n\n\n

Malware<\/strong>: Short for \u2018malicious software\u2019, it\u2019s any harmful computer program that can be used by hackers to gain unauthorised access to sensitive data in a server, computer or network. Worms, viruses, trojans and spyware are all classic examples of malware. <\/p>\n\n\n\n

Multi-factor authentication<\/strong>: An electronic authentication method that requires two or more pieces of proof to access a website or application. <\/p>\n\n\n\n

Phishing<\/strong>: Sending untargeted mass emails, social media and text messages to a large volume of people in an attempt to gain sensitive information, such as banking details and log-in credentials. <\/p>\n\n\n\n

Piggyback<\/strong>: Using a wireless internet connection that belongs to someone else without their knowledge or permission. <\/p>\n\n\n\n

Ransomware<\/strong>: Malicious software designed to encrypt files or restrict access to systems, rendering them unusable until a ransom payment is made. <\/p>\n\n\n\n

Social engineering<\/strong>: <\/strong>Psychological manipulation tactics used to get people to divulge confidential information or perform certain actions. Much of what people think of as \u2018hacking\u2019 is really just old-fashioned social engineering.  <\/p>\n\n\n\n

Spoofing<\/strong>: Not as funny as it sounds, this is the act of disguising communication from a malicious source to impersonate a legitimate, trusted source. This can apply to emails, websites, text messages and phone calls. <\/p>\n\n\n\n

Spyware<\/strong>: Malware designed to gather data about you via surveilling your device, without your consent. This data is often forwarded to a third party who can use it for nefarious means. <\/p>\n\n\n\n

Trojan<\/strong>: Malware that\u2019s disguised as legitimate software in order to gain access into a computer or network. You\u2019ve heard of a Trojan horse, right? It\u2019s that, but with software. <\/p>\n\n\n\n

White hat<\/strong>: A non-malicious user who \u2018hacks\u2019 into a computer or network to expose security flaws or evaluate security systems with the owner\u2019s consent, so they can find their vulnerabilities. Good guys.  <\/p>\n\n\n\n

Worm<\/strong>: Every bit as slimy as it sounds, this is malware that can self-replicate and copy itself across a network, without the need for host software or human intervention. <\/p>\n\n\n\n

Want to learn more? Visit <\/em>cryptoloc.com\/blog<\/em><\/a> for more cybersecurity explainers. <\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

Can\u2019t tell your malware from malarkey? Do you think phishing is something you do with your mates on the weekend? If you\u2019re sick of just smiling and nodding politely when the subject turns to cybercrime, you\u2019re in luck \u2013 we\u2019ve broken down the meanings of the most common cybercrime terms here. Account harvesting: Collecting email […]<\/p>\n","protected":false},"author":3,"featured_media":1112,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/872"}],"collection":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/comments?post=872"}],"version-history":[{"count":1,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/872\/revisions"}],"predecessor-version":[{"id":873,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/872\/revisions\/873"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/media\/1112"}],"wp:attachment":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/media?parent=872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/categories?post=872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/tags?post=872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}