Expert: State-sponsored risk 'going up like crazy'

Hacker Tools and Techniques: Underground Sites and Hacking Groups

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Pwn2Own

    Pwn2Own is an annual hacking competition sponsored by security vendor TippingPoint and held at the CanSecWest security conference. 

  • alternate data stream (ADS)

    An alternate data stream (ADS) is a feature of Windows New Technology File System (NTFS) that contains metadata for locating a specific file by author or title. 

  • zero-day exploit

    A zero-day exploit is one that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known...(Continued) 

  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub... 

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of attack against an enterprise, coupled with a demand for money to avert or stop the attack. 

  • meet-in-the-middle attack

    Meet-in-the-middle is a type of attack that can exponentially reduce the number of brute force permutations required to decrypt text that has been encrypted by more than one key. Such an attack makes it much easier for an intruder to gain access to d... 

  • man in the middle attack (fire brigade attack)

    A bucket brigade attack is one in which the attacker intercepts messages in a public key exchange and then retransmits them, substituting their own public key for the requested one, so that the two original parties still appear to be communicating wi... 

  • Echelon

    Echelon is an officially unacknowledged U.S.-led global spy network that operates an automated system for the interception and relay of electronic communications. 

  • black hat

    Black hat is used to describe a hacker (or, if you prefer, cracker) who breaks into a computer system or network with malicious intent. 

  • van Eck phreaking

    Van Eck phreaking is a form of eavesdropping in which special equipment is used to pick up telecommunication signals or data within a computer device by monitoring and picking up the electromagnetic fields (EM fields) that are produced by the signals...