Skip to content

What is it?

Malicious code that encrypts files on a computing device, enabling an attacker to demand a ransom from the legitimate owner to recover the encrypted data.

Why is it important?

Numerous high-profile ransomware cases – including the May 2017 WannaCry ransomware attack that struck at least 50 organizations(WannaCry 2017) – have occurred over the last several years, involving medical centers, police departments, and government organizations. These occurrences show the negative impact ransomware can have on an organization’s operations and finances.

...continue reading "Term of the Week: Ransomware"

What is it?

An exploit in which an attacker, typically using email, attempts to trick a computer user into opening web links, entering personal information into a web form or fake website, or taking an action that allows the attacker to obtain sensitive information. Spear phishing targets a specific individual or group of individuals using personal information.

Why is it important?

Phishing and spear phishing are the most common attack methods for attackers to gain an initial foothold into an organization or obtain sensitive data.

...continue reading "Term of the Week: Phishing"

What is it?

A part of the internet that is intentionally hidden from standard browsers. It is accessible only through specialized software with an appropriate configuration or authorization. The dark web -- sometimes called darknet -- provides anonymous access to the internet for people who want to keep information about themselves hidden from view. It also provides anonymous hosting.

Why is it important?

Although the dark web is primarily known to the general public as a place where illegal activity takes place, its original intent was to provide a private environment. Any business that has a need for anonymous browsing or anonymous communication may find the dark web useful. Business professionals also need to know about the dark web because it is used for illegal activities, including storage of stolen information.

...continue reading "Term of the Week: Dark Web"

What is it?

A product vulnerability that the developers are unaware of.

Why is it important?

Zero-day vulnerabilities are important because there is the potential for them to be exploited before developers have a chance to patch the affected product. Once a zero-day vulnerability has been detected, companies often have very little time to correct the issue before the vulnerability is used to attack the product.

...continue reading "Term of the Week: Zero-day Vulnerability"