40 relations: BASHLITE, Black Hat Briefings, Blue Frog, Botnet, Charlie Miller (security researcher), Click fraud, Computer science, Computer security, Computer virus, Denial-of-service attack, EBay, Email spam, Etisalat, Internet Relay Chat, IPhone, List of zombie films, Low Orbit Ion Cannon, MafiaBoy, Malware, Michael Gregg, Money mule, Nokia, Pay-per-click, Phishing, Proof of concept, Sardis, Mississippi, Security hacker, Smartphone, SMS, Spam Prevention Early Warning System, Spamming, Spyware, Steve Gibson (computer programmer), Symbian, Text messaging, The New York Times, Trojan horse (computing), United Arab Emirates, Yahoo!, Zombie.
BASHLITE (also known as Gafgyt, Lizkebab, Qbot, Torlus and LizardStresser) is malware which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS).
Black Hat Briefings (commonly referred to as Black Hat) is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world.
The Blue Frog tool, produced by Blue Security Inc., operated in 2006 as part of a community-based anti-spam system which tried to persuade spammers to remove community members' addresses from their mailing lists by automating the complaint process for each user as spam is received.
A botnet is a number of Internet-connected devices, each of which is running one or more bots.
Charles Alfred Miller is an American computer security researcher with Cruise Automation.
Click fraud is a type of fraud that occurs on the Internet in pay-per-click (PPC) online advertising.
Computer science deals with the theoretical foundations of information and computation, together with practical techniques for the implementation and application of these foundations.
Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.
In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
eBay Inc. is a multinational e-commerce corporation based in San Jose, California that facilitates consumer-to-consumer and business-to-consumer sales through its website.
Email spam, also known as junk email, is a type of electronic spam where unsolicited messages are sent by email.
Emirates Telecommunication Group Company PJSC, (مؤسسة الإمارات للاتصالات, Mu'asissat al-'Imārāt lil-'Ittiṣālāt, literally, "Emirates Institute for Communications"), branded trade name Etisalat (اتصالات, literally "communications"), is a multinational Emirati based telecommunications services provider, currently operating in 16 countries across Asia, the Middle East and Africa.
Internet Relay Chat (IRC) is an application layer protocol that facilitates communication in the form of text.
iPhone is a line of smartphones designed and marketed by Apple Inc. The iPhone line of products use Apple's iOS mobile operating system software.
The following is a list of zombie feature films.
Low Orbit Ion Cannon (LOIC) is an open-source network stress testing and denial-of-service attack application, written in C#.
Michael Calce (born 1986, also known as MafiaBoy) was a high school student from Île Bizard, Quebec, who launched a series of highly publicized denial-of-service attacks in February 2000 against large commercial websites, including Yahoo!, Fifa.com, Amazon.com, Dell, Inc., E*TRADE, eBay, and CNN.
Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.
Michael Gregg is an American computer security specialist, noted speaker at security related events, and an author/coauthor of multiple books such as Build Your Own Network Security Lab and Inside Network Security Assessment.
A money mule, sometimes called a "smurfer," is a person who transfers money acquired illegally (e.g., stolen) in person, through a courier service, or electronically, on behalf of others.
Nokia is a Finnish multinational telecommunications, information technology, and consumer electronics company, founded in 1865.
Pay-per-click (PPC), also known as cost per click (CPC), is an internet advertising model used to direct traffic to websites, in which an advertiser pays a publisher (typically a website owner or a network of websites) when the ad is clicked.
Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
Proof of concept (PoC) is a realization of a certain method or idea in order to demonstrate its feasibility, or a demonstration in principle with the aim of verifying that some concept or theory has practical potential.
Sardis is a town in Panola County, Mississippi.
A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.
A smartphone is a handheld personal computer with a mobile operating system and an integrated mobile broadband cellular network connection for voice, SMS, and Internet data communication; most, if not all, smartphones also support Wi-Fi.
SMS (short message service) is a text messaging service component of most telephone, internet, and mobile-device systems.
The Spam Prevention Early Warning System (SPEWS) was an anonymous service which maintained a list of IP address ranges belonging to Internet service providers (ISPs) which host spammers and show little action to prevent their abuse of other networks' resources.
Electronic spamming is the use of electronic messaging systems to send an unsolicited message (spam), especially advertising, as well as sending messages repeatedly on the same site.
Spyware is software that aims to gather information about a person or organization sometimes without their knowledge, that may send such information to another entity without the consumer's consent, that asserts control over a device without the consumer's knowledge, or it may send such information to another entity with the consumer's consent, through cookies.
Steven "Steve" Gibson (born 26 March 1955) is an American software engineer, security researcher, and IT security proponent.
Symbian is a discontinued mobile operating system (OS) and computing platform designed for smartphones.
Text messaging, or texting, is the act of composing and sending electronic messages, typically consisting of alphabetic and numeric characters, between two or more users of mobile phones, tablets, desktops/laptops, or other devices.
The New York Times (sometimes abbreviated as The NYT or The Times) is an American newspaper based in New York City with worldwide influence and readership.
In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.
The United Arab Emirates (UAE; دولة الإمارات العربية المتحدة), sometimes simply called the Emirates (الإمارات), is a federal absolute monarchy sovereign state in Western Asia at the southeast end of the Arabian Peninsula on the Persian Gulf, bordering Oman to the east and Saudi Arabia to the south, as well as sharing maritime borders with Qatar to the west and Iran to the north.
Yahoo! is a web services provider headquartered in Sunnyvale, California and wholly owned by Verizon Communications through Oath Inc..
A zombie (Haitian French: zombi, zonbi) is a fictional undead being created through the reanimation of a human corpse.