A targeted attack strategy in which cybercriminals infect websites that they consider to be fertile ground for potential victims, and wait for the planted malware to end up on their computers. This wildlife metaphor refers to a place where animals… Read Full Article

A technology that allows to change a web page content on a client’s side and add one’s own content via injecting a malicious code into the browser address space and intercepting all the http requests and responds from the server.

A web shell is a command shell that enables remote control of a web server, and is commonly used in cyberattacks. Read Full Article

A standard that extends the capabilities of the HTTP protocol. WebDAV provides a framework for group work with online files, in particular for coediting documents. Unlike HTTP, WebDAV allows users not only to read, but write object contents, and also… Read Full Article

A data streaming technology connecting two client programs directly without using a central server. Its primary use is browser-based video conferencing without any extra software. WebRTC is developed by Google as open-source software. The technology is currently supported by Firefox,… Read Full Article

Website or web defacement is an attack on a website that alters its visual appearance or informational content. Read Full Article

An IT expert who hacks into computer systems to find vulnerabilities in them. Unlike cybercriminals, ethical hackers report their findings to developers and work with them to fix bugs. White hats can be motivated by either altruism or financial reward.… Read Full Article

Wi-Fi (short for ‘Wireless-Fidelity’) is the name commonly given to wireless networks that conform to the 802.11 specification laid down by IEEE (Institute of Electrical and Electronic Engineers). Wi-Fi provides fast data transfer rates and has become almost ubiquitous in… Read Full Article

A type of DoS attack in which the attacker breaks the wireless connection between the victim device and the access point. The method is based on the use of a special disassociation frame specified under IEEE 802.11. Transferring such a… Read Full Article

An SSL certificate that protects multiple subdomains on a single site. For example, one wildcard certificate can be used to sign resources located on the domains: example.com test.example.com promo.example.com www.example.com Since the certificate covers only one level of subdomains, the… Read Full Article

The WildList was established in July 1993 by anti-virus researcher Joe Wells and has since been published monthly by the WildList Organization (now part of ICSA Labs (itself part of TrueSecure Corporation). It aims to keep track of malware that… Read Full Article

In the Windows operating system, the registry is a database that stores information about the configuration and settings of installed applications, plus other critical information. The registry was developed as an alternative to INI files, previously used to store the… Read Full Article

A technology used in Windows operating systems since Vista. Registry virtualization is intended to ensure the compatibility of programs developed for earlier releases of the OS. The need arose because most pre-Vista applications ran under Windows with administrator rights and… Read Full Article

A type of malware, the purpose of which is to wipe (erase data from) the hard drive of the computer it infects.

An encryption algorithm for data transmitted over wireless networks. Adopted as a standard in 1997, today it is viewed as unreliable and outdated. It comes in two implementations: WEP-40 and WEP-104, which differ only by length of the secret key.… Read Full Article

Worms are generally considered to be a subset of viruses, but with key differences. A worm is a computer program that replicates, but does not write its code to other files: instead, it installs itself on a victim’s computer and… Read Full Article

A wireless security technology that superseded the outdated WEP standard. Unlike its predecessor, WPA supports RC4 data encryption with dynamic keys and EAP authentication. It was followed by the release of the WPA2 specification, which is built on the more… Read Full Article