A process of changing a program code into a form difficult for human understanding, while the program’s functions remain the same. The purposes of obfuscation include preserving confidentiality of the program development as well as defending from cybercriminals who attack… Read Full Article

A technology developed by Microsoft for embedding objects created in one program into another. An example of OLE is inserting Excel spreadsheets into Word documents. The method supports two modes: • Full embedding, where the link with the data source is… Read Full Article

Given enough time and attempts, a static password is much easier to crack than one that is valid for just a short time. A one-time password is used as a supplement to a static password to make identity theft more… Read Full Article

What ontologies are, how ontologies are used in cybersecurity, and how they differ from knowledge bases and taxonomies. Read Full Article

Open source software is software that is developed, maintained and distributed freely, based on open collaboration between programmers. As the name suggests, the source code for the operating system or application is published openly. Various Unix-based operating systems have been… Read Full Article

An open decentralized user authentication standard. By creating an account with an OpenID provider, it is possible to use the same credentials to sign into different online resources that use OpenIDs. Moreover, the user is the one who determines which… Read Full Article

OPSEC (short for Operations Security) is the process of identifying and protecting critical information. OPSEC principles were originally designed by the US military to prevent leakage of heterogeneous data chunks, which could give away a bigger piece of secret information… Read Full Article

OSINT (open-source intelligence) is a branch of intelligence that analyzes information about people or organizations from sources available to the public. Britain and the United States actively used OSINT during WWII, with special units monitoring enemy broadcasts. Today, OSINT methodology… Read Full Article

An open format for describing vulnerabilities within a target system. It standardizes models for analyzing vulnerabilities and presenting basic information about the system being investigated. The report provides a comprehensive overview of the issue — a description of the initial… Read Full Article

A software update method that involves sending the latest versions via Wi-Fi or a mobile data transfer network. A key feature of the technology is the centralized distribution of the installation package to a wide circle of recipients. OTA is… Read Full Article

Theft of confidential user information using malware that overlays its own windows on top of another program. When the target application is running, the overlay opens messages or data input forms identical to the real ones. Victims enter information (for… Read Full Article

A type of cyberattack on mobile users in which a malicious app opens an active window over a legitimate program. This layer can fully replicate the target product interface, or be transparent and intercept user actions on the touch screen.… Read Full Article