Email spoofing is a technique to trick users into thinking a message came from a trustworthy source. Read Full Article

A technology, that executes code in the an artificial environment before they are actually launched, therefore allowing the detection to be made without letting the suspect loose within an actual system.

EMV is a plastic card standard codeveloped by the payment systems Europay, Mastercard, and Visa and named for the first letters of their respective names. EMV cards’ enhanced security comes from an embedded chip called Secure Element. The chip can… Read Full Article

Encryption describes the process of jumbling up data in such a way that it can not be easily understood by those who are not authorized to do so. The jumbled data is stored as ‘ciphertext’. A key, known as a… Read Full Article

Also known as cryptomalware. Type of ransomware that encrypts user’s files, and demands ransom. Sophisticated cryptomalware uses advanced encryption methods so files could not be decrypted without unique key.

End-to-end encryption (sometimes written E2E) is a method of secure data exchange whereby information is encoded and decoded only on end devices. This approach guarantees the confidentiality of transmitted data and almost nullifies the risk of its being intercepted or… Read Full Article

Endpoint Detection and Response (EDR) refers to a class of solutions for the detection and analysis of malicious activity on endpoints: workstations, servers, IoT devices, and so forth. Unlike antivirus software, which is designed for fighting typical and mass threats,… Read Full Article

A suite of anti-hacking tools providing additional protection for applications in the Windows environment. EMET allows users to configure security control settings for individual applications and the operating system as a whole. It includes tools for impeding the execution of… Read Full Article

A set of specifications for data transfer between devices on a local network. The standards describe packet-switching technology, protocols, and the physical implementation of the connection. Ethernet is the most common LAN technology. It transfers data as frames — blocks… Read Full Article

An evil maid attack is an act of hacking a device through physical access. The name refers to a scenario where a hotel employee compromises a laptop, smartphone, or tablet left in a room. Other versions of the evil maid… Read Full Article

The term exploit describes a program, piece of code or even some data written by a hacker or malware writer that is designed to take advantage of a bug or vulnerability in an application or operating system. Using the exploit,… Read Full Article

Also known as Exploit pack. A set of exploits and tools that allows creation of malicious websites for malware distribution.

Also known as Exploit kit. Exploits are typically distributed in packs containing multiple exploits for different vulnerabilities. The pack is used to identify software installed on a victim’s computer, match it against the list of exploits in the pack and… Read Full Article

A term defining the scope and impact of malicious software. In-the-wild malware is active and can be found on devices belonging to ordinary users. Such programs threaten the security of real data, unlike samples stored on computers for research purposes.

A set of specifications that describe an authentication framework for wireless networks. It provides interaction between a node, a communication device performing the function of an authenticator, and an authentication server. EAP is a universal standard that permits the use… Read Full Article