Here you will find the glossary of common security term found throughout this site and frequently asked questions.

Glossary

Exploit kit: A sophisticated attack usually embedded on a website or email. An exploit kit throws a series of specially crafted files, such as a flash movie, PDF document, Java applet, etc at your Internet browser to exploit outdated or non-patched applications that are vulnerable. Once a vulnerable program is found and exploited, the exploit kit executes its payload, usually a virus, to infect the user’s computer.

Ransomware: A virus that encrypts your personal files and offers to unencrypt them for a set price paid usually via Bitcoin.

Social Media: Social sites such as Facebook, Instagram, Snapchat, Twitter, etc. One overlooked social media is email.

Social Engineering: “The art of manipulation” A offer of a reward in return for a action on your part. Impersonating a friend or company to gain the users trust.

Spoofing (email): A person or program that impersonates a company, government agency, or person as the sender of an email.

Virus: A malicious program that runs a series of tasks on an infected computer, usually destructive. Since there is no standard on what distinguish a virus from malware, spyware, ransomware, etc. Many antivirus companies have their own definitions of a virus that varies widely between AV companies.

Worm (virus): A virus that self propagates from machine to machine without any interaction from a user. Worms usually use vulnerabilities in operating systems to spread.

Zero-day vulnerability: A vulnerability in a program that has been discovered but never disclosed to the public, or the software vendor.

Zero-day Virus: A virus found on the Internet that has not been detected by any antivirus software. All viruses start as zero-days until antivirus companies can publish detection signatures


Internet Security TIPS

  • Surf the Internet from any device that isn’t Microsoft Windows!

MS Windows is the most vulnerable and exploitable operating system on the planet! Use an iPad, iPhone, Mac or Android devices like a Chrome book.

  • Install Antivirus software!

If you don’t have anti-virus software, or you have it but it’s expired delete it and get some free AV from companies like AVG, Avira. Avast, even Norton! Of course you can purchase AV but make sure you stay on top of the subscription for updates. The nice thing about Free AV is it never expires but will spam you to upgrade once a week.

  • Use sites like VirusTotal.com to scan for suspicious files and URL links!

If you are suspicious of a file, or website you can it through VirusTotal.com which will scan it by multiple AV and WEB malware tracking sites.

  1. Make sure Windows updates are ran and All Internet plugins are updated!
  2. “Think before you click” on any link with an email!
  3. Always look at senders of emails as suspicious!
  4. Never forward a email to a large group of users just because it asked you too.
  5. Change passwords often, and always use 2-step authentication if available.


Useful Links:

EternalBlue

Data Breaches

Malware Domains