Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Androidâ„¢ device!
Download
Faster access than browser!
 

Gh0st RAT

Index Gh0st RAT

Gh0st RAT is a Trojan horse for the Windows platform that the operators of GhostNet used to hack into some of the most sensitive computer networks on Earth. [1]

20 relations: C++, Computer and network surveillance, Computer security, Cyber spying, Cyber-security regulation, Cyberwarfare, Espionage, GhostNet, Information Warfare Monitor, Malware, Microsoft Windows, Phishing, Proactive cyber defence, Public domain, Security hacker, Surveillance, The New York Times, The Times, Toronto Star, Trojan horse (computing).

C++

C++ ("see plus plus") is a general-purpose programming language.

New!!: Gh0st RAT and C++ · See more »

Computer and network surveillance

Computer and network surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet.

New!!: Gh0st RAT and Computer and network surveillance · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Gh0st RAT and Computer security · See more »

Cyber spying

Cyber spying, or cyber espionage, is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using methods on the Internet, networks or individual computers through the use of proxy servers, cracking techniques and malicious software including Trojan horses and spyware.

New!!: Gh0st RAT and Cyber spying · See more »

Cyber-security regulation

A cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations to protect their systems and information from cyberattacks like viruses, worms, Trojan horses, phishing, denial of service (DOS) attacks, unauthorized access (stealing intellectual property or confidential information) and control system attacks.

New!!: Gh0st RAT and Cyber-security regulation · See more »

Cyberwarfare

Cyberwarfare is the use or targeting in a battlespace or warfare context of computers, online control systems and networks.

New!!: Gh0st RAT and Cyberwarfare · See more »

Espionage

Espionage or spying, is the act of obtaining secret or confidential information without the permission of the holder of the information.

New!!: Gh0st RAT and Espionage · See more »

GhostNet

GhostNet is the name given by researchers at the Information Warfare Monitor to a large-scale cyber spying operation discovered in March 2009.

New!!: Gh0st RAT and GhostNet · See more »

Information Warfare Monitor

The Information Warfare Monitor (IWM) was an advanced research activity tracking the emergence of cyberspace as a strategic domain.

New!!: Gh0st RAT and Information Warfare Monitor · See more »

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Gh0st RAT and Malware · See more »

Microsoft Windows

Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.

New!!: Gh0st RAT and Microsoft Windows · See more »

Phishing

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

New!!: Gh0st RAT and Phishing · See more »

Proactive cyber defence

Proactive cyber defense or active cyber defense (ACD) means acting in anticipation to oppose an attack involving computers and networks.

New!!: Gh0st RAT and Proactive cyber defence · See more »

Public domain

The public domain consists of all the creative works to which no exclusive intellectual property rights apply.

New!!: Gh0st RAT and Public domain · See more »

Security hacker

A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.

New!!: Gh0st RAT and Security hacker · See more »

Surveillance

Surveillance is the monitoring of behavior, activities, or other changing information for the purpose of influencing, managing, directing, or protecting people.

New!!: Gh0st RAT and Surveillance · See more »

The New York Times

The New York Times (sometimes abbreviated as The NYT or The Times) is an American newspaper based in New York City with worldwide influence and readership.

New!!: Gh0st RAT and The New York Times · See more »

The Times

The Times is a British daily (Monday to Saturday) national newspaper based in London, England.

New!!: Gh0st RAT and The Times · See more »

Toronto Star

The Toronto Star is a Canadian broadsheet daily newspaper.

New!!: Gh0st RAT and Toronto Star · See more »

Trojan horse (computing)

In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.

New!!: Gh0st RAT and Trojan horse (computing) · See more »

Redirects here:

Gh0st Rat, Ghost Rat.

References

[1] https://en.wikipedia.org/wiki/Gh0st_RAT

OutgoingIncoming
Hey! We are on Facebook now! »