Cyber Security

Backdoor

When a site gets compromised, the attackers will often leave some piece of malware behind to allow them access back to the site. Hackers want to leave a door open to retain control of the website and to reinfect it continuously. This type of malware is called a backdoor.Backdoors are types of malware that allow […]

Backdoor Read More »

CyberWarfare

Cyber warfare refers to the use of technology to launch attacks on nations, governments, and citizens, causing comparable harm to actual warfare using weaponry. To date, there hasn’t been an outright “cyberwar” with declared antagonists, however, there are a number of incidents that have caused serious disruption to countries’ infrastructure that are suspected of being

CyberWarfare Read More »

salami slicing attack

A salami attack is when you take a very small amount of money from an awful lot of accounts. The canonical example is a bank programmer depositing sub-cent amounts of interest in a special account. These rounding errors add up.I’m trying to find the first actual documented theft or attempted theft using this attack.I’m hoping

salami slicing attack Read More »

Malware Bot

A bot (short for “robot”) is a program that operates as an agent for a user or another program or simulates a human activity. On the Internet, the most ubiquitous bots are the programs, also called spiders or crawlers, that access Web sites and gather their content for search engine indexes. Bots are also used

Malware Bot Read More »

Malware zombie

A zombie is a computer that has been implanted with a daemon that puts it under the control of a malicious hacker without the knowledge of the computer owner. Zombies are used by malicious hackers to launch DoS attacks. The hacker sends commands to the zombie through an open port. On command, the zombie computer

Malware zombie Read More »