92 relations: Advanced persistent threat, Akbot, Alureon, Antivirus software, Asprox botnet, Bagle (computer worm), Bitcoin, Bot herder, BotHunter, Bredolab botnet, Browser exploit, Bulletproof hosting, Chameleon botnet, Click fraud, Communication protocol, Computer cluster, Computer network, Computer worm, Conficker, Covert channel, Cutwail botnet, Cybercrime, Denial-of-service attack, Domain generation algorithm, Domain Name System, Donbot botnet, Drive-by download, EarthLink, Egress filtering, Email spam, Fast flux, Federal Bureau of Investigation, Festi botnet, Firewall (computing), Gameover ZeuS, GitHub, Great Cannon, Grum botnet, Gumblar, Hacktivism, Hypertext Transfer Protocol, InformationWeek, Instagram, Internet, Internet backbone, Internet bot, Internet of things, Internet Relay Chat, Kelihos botnet, Kraken botnet, ..., Lethic botnet, List of Internet Relay Chat commands, Low Orbit Ion Cannon, Mariposa botnet, Mega-D botnet, Mirai (malware), Network packet, Norton AntiBot, PC World, Peer-to-peer, Project Chanology, Public-key cryptography, Ramnit, Reddit, Robot, Rustock botnet, Sality, Sandia National Laboratories, SANS Institute, Simple Mail Transfer Protocol, Smartphone, Spambot, Spyware, Srizbi botnet, Storm botnet, Subdomain, Timeline of computer viruses and worms, Tor (anonymity network), Torpig, Trojan horse (computing), Twitter, United States Army Research Laboratory, Virtual machine, Vulcanbot, Waledac botnet, Wired (magazine), XMPP, ZeroAccess botnet, Zeus (malware), Zombie (computer science), .onion, 4chan. Expand index (42 more) » « Shrink index
An advanced persistent threat is a set of stealthy and continuous computer hacking processes, often orchestrated by a person or persons targeting a specific entity.
Akbot was a computer virus that infected an estimated 1.3 million computers and added them to a botnet.
Alureon (also known as TDSS or TDL-4) is a trojan and bootkit created to steal data by intercepting a system's network traffic and searching for: banking usernames and passwords, credit card data, PayPal information, social security numbers, and other sensitive user data.
Antivirus software, or anti-virus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
The Asprox botnet (discovered around 2008), also known by its aliases Badsrc and Aseljo, is a botnet mostly involved in phishing scams and performing SQL injections into websites in order to spread malware.
Bagle (also known as Beagle) was a mass-mailing computer worm affecting Microsoft Windows.
Bitcoin (₿) is the world's first cryptocurrency, a form of electronic cash.
Bot herders are hackers who use automated techniques to scan specific network ranges and find vulnerable systems, such as machines without current security patches, on which to install their bot program.
BotHunter is a free utility for Unix, which aims at detecting botnet activity within a network.
The Bredolab botnet, also known by its alias Oficla, was a Russian botnet mostly involved in viral e-mail spam.
A browser exploit is a form of malicious code that takes advantage of a flaw or vulnerability in an operating system or piece of software with the intent to breach browser security to alter a user's browser settings without their knowledge.
Bulletproof hosting is a service provided by some domain hosting or web hosting firms that allows their customer considerable leniency in the kinds of material they may upload and distribute.
The Chameleon botnet is a botnet that was discovered on February 28, 2013 by the security research firm, spider.io.
Click fraud is a type of fraud that occurs on the Internet in pay-per-click (PPC) online advertising.
In telecommunication, a communication protocol is a system of rules that allow two or more entities of a communications system to transmit information via any kind of variation of a physical quantity.
A computer cluster is a set of loosely or tightly connected computers that work together so that, in many respects, they can be viewed as a single system.
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.
Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008.
In computer security, a covert channel is a type of attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy.
The Cutwail botnet, founded around 2007, is a botnet mostly involved in sending spam e-mails.
Cybercrime, or computer oriented crime, is crime that involves a computer and a network.
In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
Domain generation algorithms (DGA) are algorithms seen in various families of malware that are used to periodically generate a large number of domain names that can be used as rendezvous points with their command and control servers.
The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network.
Donbot, also known by its aliases Buzus and Bachsoy, is a botnet mostly involved in sending pharmaceutical and stock-based e-mail spam.
Drive-by download means two things, each concerning the unintended download of computer software from the Internet.
EarthLink is an IT services, network and communications provider headquartered in Atlanta, Georgia.
In computer networking, egress filtering is the practice of monitoring and potentially restricting the flow of information outbound from one network to another.
Email spam, also known as junk email, is a type of electronic spam where unsolicited messages are sent by email.
Fast flux is a DNS technique used by botnets to hide phishing and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies.
The Federal Bureau of Investigation (FBI), formerly the Bureau of Investigation (BOI), is the domestic intelligence and security service of the United States, and its principal federal law enforcement agency.
The Festi botnet, also known by its alias of Spamnost, is a botnet mostly involved in email spam and denial of service attacks.
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Gameover ZeuS is a peer-to-peer botnet based on components from the earlier ZeuS trojan.
GitHub Inc. is a web-based hosting service for version control using Git.
The Great Cannon of China is an attack tool that is used to launch distributed denial-of-service attacks on websites by intercepting massive amounts of web traffic and redirecting them to targeted websites.
The Grum botnet, also known by its alias Tedroo and Reddyb, was a botnet mostly involved in sending pharmaceutical spam e-mails.
In Internet activism, hacktivism or hactivism (a portmanteau of hack and activism) is the subversive use of computers and computer networks to promote a political agenda or a social change.
The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems.
InformationWeek is a digital magazine which conducts corresponding face-to-face events, virtual events, and research.
Instagram is a photo and video-sharing social networking service owned by Facebook, Inc. It was created by Kevin Systrom and Mike Krieger, and launched in October 2010 exclusively on iOS.
The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.
The Internet backbone might be defined by the principal data routes between large, strategically interconnected computer networks and core routers on the Internet.
An Internet Bot, also known as web robot, WWW robot or simply -bot-, is a software application that runs automated tasks (scripts) over the Internet.
The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data, creating opportunities for more direct integration of the physical world into computer-based systems, resulting in efficiency improvements, economic benefits, and reduced human exertions.
Internet Relay Chat (IRC) is an application layer protocol that facilitates communication in the form of text.
The Kelihos botnet, also known as Hlux, is a botnet mainly involved in spamming and the theft of bitcoins.
The Kraken botnet was the world's largest botnet.
The Lethic Botnet (initially discovered around 2008) is a botnet consisting of an estimated 210 000 - 310 000 individual machines which are mainly involved in pharmaceutical and replica spam.
This is a list of all Internet Relay Chat commands from RFC 1459, RFC 2812, and extensions added to major IRC daemons.
Low Orbit Ion Cannon (LOIC) is an open-source network stress testing and denial-of-service attack application, written in C#.
The Mariposa botnet, discovered December 2008, is a botnet mainly involved in cyberscamming and denial-of-service attacks.
The Mega-D, also known by its alias of Ozdok, is a botnet that at its peak was responsible for sending 32% of spam worldwide.
Mirai (Japanese for "the future", 未来) is a malware that turns networked devices running Linux into remotely controlled "bots" that can be used as part of a botnet in large-scale network attacks.
A network packet is a formatted unit of data carried by a packet-switched network.
Norton AntiBot, developed by Symantec, monitors applications for damaging behavior.
PC World, stylized PCWorld, is a global computer magazine published monthly by IDG.
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers.
Project Chanology (also called Operation Chanology) was a protest movement against the practices of the Church of Scientology by members of Anonymous, a leaderless Internet-based group.
Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.
Ramnit is a Computer worm affecting Windows users.
Reddit (stylized in its logo as reddit) is an American social news aggregation, web content rating, and discussion website.
A robot is a machine—especially one programmable by a computer— capable of carrying out a complex series of actions automatically.
The Rustock botnet was a botnet that operated from around 2006 until March 2011.
Sality is the classification for a family of malicious software (malware), which infects files on Microsoft Windows systems.
The Sandia National Laboratories (SNL), managed and operated by the National Technology and Engineering Solutions of Sandia (a wholly owned subsidiary of Honeywell International), is one of three National Nuclear Security Administration research and development laboratories.
The SANS Institute (officially the Escal Institute of Advanced Technologies) is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training and selling Certificates.
Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission.
A smartphone is a handheld personal computer with a mobile operating system and an integrated mobile broadband cellular network connection for voice, SMS, and Internet data communication; most, if not all, smartphones also support Wi-Fi.
A spambot is a computer program designed to assist in the sending of spam.
Spyware is software that aims to gather information about a person or organization sometimes without their knowledge, that may send such information to another entity without the consumer's consent, that asserts control over a device without the consumer's knowledge, or it may send such information to another entity with the consumer's consent, through cookies.
Srizbi BotNet, considered one of the world's largest botnets, and responsible for sending out more than half of all the spam being sent by all the major botnets combined.
The Storm botnet or Storm worm botnet (also known as Dorf botnet and Ecard malware) is a remotely controlled network of "zombie" computers (or "botnet") that have been linked by the Storm Worm, a Trojan horse spread through e-mail spam.
In the Domain Name System (DNS) hierarchy, a subdomain is a domain that is a part of a main domain.
This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.
Tor is free software for enabling anonymous communication.
Torpig, also known as Anserin or Sinowal is a type of botnet spread through systems compromised by the Mebroot rootkit by a variety of trojan horses for the purpose of collecting sensitive personal and corporate data such as bank account and credit card information.
In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.
Twitter is an online news and social networking service on which users post and interact with messages known as "tweets".
The Army Research Laboratory (ARL) is the U.S. Army's corporate research laboratory.
In computing, a virtual machine (VM) is an emulation of a computer system.
Vulcanbot is the name of a botnet predominantly spread in Vietnam, apparently with political motives.
Waledac, also known by its aliases Waled and Waledpak, was a botnet mostly involved in e-mail spam and malware.
Wired is a monthly American magazine, published in print and online editions, that focuses on how emerging technologies affect culture, the economy, and politics.
Extensible Messaging and Presence Protocol (XMPP) is a communication protocol for message-oriented middleware based on XML (Extensible Markup Language).
ZeroAccess is a Trojan horse computer malware that affects Microsoft Windows operating systems.
Zeus, ZeuS, or Zbot is a Trojan horse malware package that runs on versions of Microsoft Windows.
In computer science, a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.
.onion is a special-use top level domain suffix designating an anonymous hidden service reachable via the Tor network.
4chan is an English-language imageboard website.
Bot HTTP Request, Bot net, Bot nets, BotNet, Botnets, C&C server, Command and control (malware), Command and control server, Command-and-control server, Control and command server, DoSnet, Dosnet, Xarvester, Zombie botnet, Zombie network.