Skip to main content

Glossary

A B C D F H I M P R S T V W All

A type of malware, usually invisible to the user, which, once installed, gives access to the computer to an unauthorised remote party. An attacker can then take full control of the computer, download data, make copies, etc. without the user's permission.

A bot is a program that executes automatisms, either autonomously or based on remote commands. It is often used for malicious purposes. They can often be part of botnets.

Bots can check the backend of computers, looking for confidential information. They often run in the background, without the user's knowledge, using the device's resources for malicious purposes.

A hacked network of IT devices controlled by a 3rd party (hacker) and used to cause damage. The most common forms of malicious activity are: sending bulk spam, launching Denial of Service (DoS) attacks, phishing, etc. Botnets are often rented out by cybercriminals for various purposes.

A login, password, or encryption key hacking method where attackers go through all possible combinations hoping to guess correctly. A relatively old attack method, but still effective and popular with hackers. Depending on the length and complexity of the password, cracking it can take anywhere from a few seconds to years.