A type of malware, usually invisible to the user, which, once installed, gives access to the computer to an unauthorised remote party. An attacker can then take full control of the computer, download data, make copies, etc. without the user's permission.
Glossary
A bot is a program that executes automatisms, either autonomously or based on remote commands. It is often used for malicious purposes. They can often be part of botnets.
Bots can check the backend of computers, looking for confidential information. They often run in the background, without the user's knowledge, using the device's resources for malicious purposes.
A hacked network of IT devices controlled by a 3rd party (hacker) and used to cause damage. The most common forms of malicious activity are: sending bulk spam, launching Denial of Service (DoS) attacks, phishing, etc. Botnets are often rented out by cybercriminals for various purposes.
The browser cache temporarily stores the content of web pages to make them load faster. However, it can pose cybersecurity risks, as unauthorised persons can access sensitive data stored there, such as login information. In addition, the cache can be manipulated, allowing malicious scripts to be placed in it.
To increase security, it is a good idea to clear the cache regularly, especially if you share a computer, and to use private browsing mode, which does not store data. Updating browsers and security software is also essential to minimise risks.
A login, password, or encryption key hacking method where attackers go through all possible combinations hoping to guess correctly. A relatively old attack method, but still effective and popular with hackers. Depending on the length and complexity of the password, cracking it can take anywhere from a few seconds to years.