a vulnerability intentionally left in the security of a computer system or its software by its designers
data that has been encrypted
any action or device that reduces a computer system's vulnerability
looking through trash for access codes or other sensitive information
a device designed to enforce the boundary between two or more networks, limiting access
the process of taking over a live connection between two users so that the attacker can masquerade as one of the users
using a password or user ID obtained in one attack to commit another attack
an email containing live data intended to cause damage to the recipient's computer
a device that records the telephone numbers of calls received by a particular telephone
a person who combines phone phreaking with computer hacking
a person who hacks telephone systems, usually for the purpose of making free phone calls
gaining unauthorized access to a computer system via another user's legitimate connection
slang for pirated software
A non-malicious surprise contained in a program or on a circuit board installed by the developer.
The payload is the part of the malware program that actually executes its designed task.
is a form of social engineering carried out by black hats in electronic form, usually by email, with the purpose of gathering sensitive information.
Considered the original computer hackers, hit the scene in the 60s and made their mark by circumventing telecommunications security systems to place calls, including long distance, for free.
An individual who does not possess, or just doesn’t use, their own skills and know-how to hack or crack a computer system or network, but uses a pre-written program or piece of code, a script, to do the dirty work.
is the act of driving around in a vehicle with the purpose of finding an open, unsecured Wi-Fi wireless network.
Parallel websites that allow children to get around filtering software and access sites that have been blocked
Any Internet-related illegal activity.
Any technique, software, etc., used to protect computers and prevent online crime.
A hostile, strongly worded message that may contain obscene language.
The nickname a user has chosen to be identified by when playing Internet games.
Internet gamers who intentionally cause problems and/or cyberbully other gamers (i.e., individuals who play online games).
Rules or manners for interacting courteously with others online
Something of value to a person, business or organization.
Server that acts as an intermediary between users and others servers, validating user requests.
The process of identifying, analysing and evaluating risk.
A virus or physical device that logs information sent to a visual display to capture private or personal information.
An incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorised to do so.
Offshoring The practice of basing some of a company's processes or services overseas.
a personalized graphic file or rendering that represents a computer user or user’s alter ego, often used on Web exchange boards and in online gaming
a network of private computers, infected with malicious software (malware) and controlled as a group without the owners' knowledge for nefarious and, often, criminal purposes
a technology that uses the Internet and remote servers to maintain data and applications, allowing users to access applications without installation and access to their personal files from any computer with Internet access
a criminal offense that involves using the Internet or other technology to stalk or harass an individual, a group of individuals
the global network of interdependent information technology infrastructures, telecommunications networks
an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document
the process of adding geographical location, or label, to photographs, videos, website, SMS messages, QR Codes, or RSS feeds
words or phrases prefixed with the symbol; used to mark keywords or topics in a Tweet or social networking service.