We use cookies on this website, you can read about them here »

Accept cookies


Cyber Security Villains

We understand that sometimes the lingo around cyber security can be a struggle to get your head around. We have put together a few key cyber security ‘villains’ with their definitions.

Botnet – A network of infected devices, connected to the Internet, used to commit co-ordinated cyber-attacks without their owners knowledge.

Cyber-attack – Malicious attempts to damage, disrupt or gain unauthorised access to computer systems, networks or devices, via cyber means.

Denial of Service – When legitimate users are denied access to computer services (or resources), usually by overloading the service with requests.

Macro – A small program that can automate tasks in applications (such as Microsoft Office) which attackers can use to gain access to (or harm) a system.

Phishing – Untargeted, mass emails sent to many people asking for sensitive information (such as bank details) or encouraging them to visit a fake website.

Ransomware – Malicious software that makes data or systems unusable until the victim makes a payment.

Spear-phishing – A more targeted form of phishing, where the email is designed to look like it’s from a person the recipient knows/and or trusts.

Trojan – A type of malware or virus disguised as legitimate software that is used to hack into the victim’s computer.

Water-holing (watering hole attack) – Setting up a fake website (or compromising a real one) in order to exploit visiting users.

Whaling – Highly targeted phishing attacks (masquerading as legitimate emails) that are aimed at senior executives.

May 2018

Cyber Security Villains  
Share this Site