The only proven strategy to thwart CryptoLocker ransomware

Emerging Information Security Threats

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • thingbot

    A thingbot is something with an embedded system and an Internet connection that has been coopted by a hacker as a part of a botnet. A thing, in this context, could be just about anything but a computing device. 

  • socialbot

    A socialbot is a software program that simulates human behavior in automated interactions on social network sites such as Facebook and Twitter. As a rule, socialbots are designed to pass the Turing test: They're sophisticated enough to fool other use... 

  • business logic attack

    A business logic attack is an exploit that takes advantage of a flaw in programming managing the exchange of information between a user interface and the application's supporting database. 

  • search engine results page (SERP)

    A search engine results page (SERP) is the list of results that a search engine returns in response to a specific word or phrase query. 

  • mobile device attack

    A mobile device attack is an exploit targeting handheld communications devices, such as smartphones and tablets. Ed Skoudis, founder and senior security consultant of InGuardians, a security consulting firm, describes one scenario: "Bad guys are go... 

  • device attack

    A device attack is an exploit in which the attacker takes advantage of a vulnerable device to gain network access. 

  • Duqu (W32.Duqu)

    Duqu is a remote access Trojan (RAT) that is designed to steal data from computers it infects. 

  • voluntary botnet

    A voluntary botnet is a distributed network of computers whose processing power is harnessed to carry out a political or socially-motivated denial of service (DoS) attack. 

  • TDL-4 (TDSS or Alureon)

    TDL-4 is sophisticated malware that facilitates the creation and maintenance of a botnet.  The program is the fourth generation of the TDL malware, which was itself based on an earlier malicious program known as TDSS or Alureon. 

  • malvertisement (malicious advertisement or malvertising)

    A malvertisement (malicious advertisement) is an advertisement on the Internet that delivers a malicious payload.