A technology, that executes code in the an artificial environment before they are actually launched, therefore allowing the detection to be made without letting the suspect loose within an actual system.
Encryption describes the process of jumbling up data in such a way that it can not be easily understood by those who are not authorized to do so. The jumbled data is stored as ‘ciphertext’. A key, known as a decryption key, is required in order to access the original data. Encryption is used to keep prying eyes away from data that is in transit between sender and recipient (data sent over the web during an online banking transaction, for… Read Full Article
Also known as cryptomalware. Type of ransomware that encrypts user’s files, and demands ransom. Sophisticated cryptomalware uses advanced encryption methods so files could not be decrypted without unique key.
The term exploit describes a program, piece of code or even some data written by a hacker or malware writer that is designed to take advantage of a bug or vulnerability in an application or operating system. Using the exploit, an attacker gains unauthorized access to, or use of, the application or operating system. Exploits are often named after the vulnerability they use to penetrate systems: a buffer overflow, for example.
Also known as Exploit pack. A set of exploits and tools that allows creation of malicious websites for malware distribution.
Also known as Exploit kit. Exploits are typically distributed in packs containing multiple exploits for different vulnerabilities. The pack is used to identify software installed on a victim’s computer, match it against the list of exploits in the pack and deploy the appropriate exploit if one of the applications installed is vulnerable.