• June 05, 2007 05 Jun'07

    snoop server

    A snoop server is a server that uses a packet sniffer program to capture network traffic for analysis.  Continue Reading

  • June 05, 2007 05 Jun'07


    Snooping, in a security context, is unauthorized access to another person's or company's data. The practice is similar to eavesdropping but is not necessarily limited to gaining access to data during its transmission. Snooping can include casual ...  Continue Reading

  • June 05, 2007 05 Jun'07


    Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent.  Continue Reading

  • June 05, 2007 05 Jun'07


    A phreak is someone who breaks into the telephone network illegally, typically to make free long-distance phone calls or to tap phone lines.  Continue Reading

  • June 05, 2007 05 Jun'07


    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.  Continue Reading

  • June 05, 2007 05 Jun'07


    Echelon is an officially unacknowledged U.S.-led global spy network that operates an automated system for the interception and relay of electronic communications.  Continue Reading

  • June 05, 2007 05 Jun'07

    Electrohippies Collective

    The Electrohippies Collective is an international group of hacktivists based in Oxfordshire, England, whose purpose is to express its displeasure with the use of the Internet "as a tool for corporate communications and propaganda.  Continue Reading

  • June 05, 2007 05 Jun'07

    packet monkey

    On the Internet, a packet monkey is someone (see cracker, hacker, and script kiddy) who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network.  Continue Reading

  • June 05, 2007 05 Jun'07

    Google hacking (Google scanning or Engine hacking)

    Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet...  Continue Reading

  • June 05, 2007 05 Jun'07

    gray hat (or grey hat)

    Gray hat describes a cracker (or, if you prefer, hacker) who exploits a security weakness in a computer system or product in order to bring the weakness to the attention of the owners.  Continue Reading

  • June 05, 2007 05 Jun'07


    Hijacking is a type of network security attack in which the attacker takes control of a communication - just as an airplane hijacker takes control of a flight - between two entities and masquerades as one of them.  Continue Reading

  • June 05, 2007 05 Jun'07

    cookie poisoning

    On the Web, cookie poisoning is the modification of a cookie (personal information in a Web user's computer) by an attacker to gain unauthorized information about the user for purposes such as identity theft.  Continue Reading

  • June 05, 2007 05 Jun'07


    Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group.  Continue Reading

  • June 05, 2007 05 Jun'07


    Cypherpunk, a term that appeared in Eric Hughes' "A Cypherpunk's Manifesto" in 1993, combines the ideas of cyberpunk, the spirit of individualism in cyberspace, with the use of strong encryption (ciphertext is encrypted text) to preserve privacy.  Continue Reading

  • June 05, 2007 05 Jun'07

    Experts: Security software not as safe as you think

    One of the reasons enterprises rely on layers of security products is because of the flaws that often appear in their main IT infrastructure. But according to a panel of experts at the Gartner IT ...  Continue Reading

  • June 05, 2007 05 Jun'07

    Report: New hacking technique shields attackers

    A new report issued by UK-based security vendor Finjan shows that attackers are using IP addresses to mask a malicious Web page and avoid detection.  Continue Reading

  • June 05, 2007 05 Jun'07

    Should void user IDs be preserved in an audit history?

    In this SearchSecurity.com Q&A, identity management and access control expert Joel Dubin explains how inadequate management of user access can result in compliance violations and information security threats for a corporation.  Continue Reading