Skip to main content

Glossary

A B C D E F H I K M O P R S T U V W X All

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for encrypting and digitally signing email messages to ensure the security and authenticity of communications. It encrypts the content of the email so that only the recipient can decrypt it, and authenticates messages with a digital signature, preserving their integrity.

It is supported by most modern email clients and is widely used for business and personal purposes to ensure a high level of privacy.

Session Fixation is an attack in which the attacker passes a predefined session ID to the victim, for example through a malicious link or other manipulation technique. When the user logs into the application with this session ID, the attacker is already identified in the application as if he were the user. As a result, the attacker may gain unauthorized access to the victim's account and sensitive data without the user's knowledge.

In session hijacking, attackers steal session IDs to gain access to a user's active session. This allows attackers to identify themselves as the user and gain access to his or her account or sensitive data. Such attacks are usually carried out by monitoring network traffic or cookies, or by malicious software.

Phishing via SMS.

Social engineering is a manipulation technique that targets people to obtain sensitive information. Attackers use psychological tricks, such as disguising themselves as fake persons or emergencies, to trick victims into sharing passwords or personal information.

Unsolicited messages sent in bulk by electronic means (email, SMS, phone calls, social media). The content of the messages is at best just meaningless marketing text, at worst they are deliberately intended to deceive, phish (phishing) or spread viruses (malspam)

This software secretly collects sensitive information about the user's computer or device, such as browsing habits, passwords or banking details. It is usually installed without the user's knowledge, often together with other applications or software downloaded from suspicious sources. They can also often display advertisements, collect data on user behaviour or even take control of the computer.

A stolen session is a security risk where an attacker obtains the user's active session and takes control of it. The attacker can then gain unauthorised access to the user's personal data and perform actions on their behalf, such as making purchases or viewing sensitive information. There are several complex methods of session theft, some of which rely on user negligence and others on flaws in IT systems.