Ransomware

Ransomware is the name given to malicious programs designed to extort money from their victims, by blocking access to the computer or encrypting the data stored on it. The malware displays a message offering to restore the system in return for a payment. Sometimes the cybercriminals behind the scam try to lend credibility to their operation by masquerading as law enforcement officials. Their ransom message asserts that the system has been blocked, or the data encrypted, because the victim is… Read Full Article

Riskware

Riskware is the generic term used by Kaspersky Lab to describe programs that are legitimate in themselves, but have the potential for misuse by cybercriminals: for example, remote administration utilities. Such programs have always had the potential to be misused, but they now have a higher profile. During the last few years, there has been a fusion of traditional malware techniques with those of hackers. In the changing climate, such riskware programs have come in to their own as a… Read Full Article

Root access

Root is the name of the administrator account that gives the full access to system folders and files and enables their editing. A root account is the main administrator’s, or the superuser’s, account.

Rootkit

A type of malware, which is aimed at hiding its presence on a computer from antiviruses and other safety means via intercepting low-level functions of the operation system. The malicious functions of a rootkit include stealing saved passwords, scanning credit cards data, managing a DDoS-attack bot etc. A rootkit also normally includes the backdoor functions, which allows the cybercriminal to connect to an infected computer and manage it via installing additional modules.

RSA

RSA is a public key (or asymmetric) encryption algorithm, first described publicly in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman at the Massachusetts Institute of Technology (MIT) – the first letters of their surnames make up the name ‘RSA’. RSA is widely-used today to secure data – for example, in SSH, SSL and TLS protocols and in programs (e.g. browsers) that need to secure data sent over the Internet.