Adware, or advertising-supported software, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process.
The attack surface of a software environment is the sum of the different points (the "attack vectors") where an unauthorized user (the "attacker") can try to enter data to or extract data from an environment.
Blaster Worm (also known as Lovsan, Lovesan or MSBlast) is a computer worm that spread on computers running operating systems Windows XP and Windows 2000, during August 2003.
In information security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations.
A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.
Computing is any goal-oriented activity requiring, benefiting from, or creating computers.
An email attachment is a computer file sent along with an email message.
Infection control is the discipline concerned with preventing nosocomial or healthcare-associated infection, a practical (rather than academic) sub-discipline of epidemiology.
Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.
A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.
Electronic spamming is the use of electronic messaging systems to send an unsolicited message (spam), especially advertising, as well as sending messages repeatedly on the same site.
Spyware is software that aims to gather information about a person or organization sometimes without their knowledge, that may send such information to another entity without the consumer's consent, that asserts control over a device without the consumer's knowledge, or it may send such information to another entity with the consumer's consent, through cookies.
In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.
In epidemiology, a disease vector is any agent that carries and transmits an infectious pathogen into another living organism; most agents regarded as vectors are organisms, such as intermediate parasites or microbes, but it could be an inanimate medium of infection such as dust particles.
In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system.
Vulnerability management is the "cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities", particularly in software.