TechCrunch's Essential Cybersecurity Glossary

Navigating the world of cybersecurity can be challenging with its complex jargon. This glossary defines key terms to help you understand online threats and protect yourself.

A

Advanced Persistent Threat (APT): A well-resourced hacker, often state-sponsored, who gains unauthorized access and remains undetected for extended periods to steal data or sabotage systems.

Adversary-in-the-Middle (AitM) Attack: Intercepting network traffic to eavesdrop or modify data. Encryption helps protect against AitM attacks.

Arbitrary Code Execution: Running unauthorized commands or code on a system due to a vulnerability. This can enable backdoor access or malware installation.

Attribution: Identifying the source of a cyberattack, a complex and often difficult process.

B

Backdoor: A method of bypassing normal security measures to gain future access to a system. Backdoors can be legitimate or malicious.

Black/White Hat Hacker: Black hats hack illegally for personal gain. White hats hack ethically to find vulnerabilities and improve security.

Botnet: A network of compromised devices controlled by a command-and-control server, used for attacks like DDoS.

Brute Force Attack: Repeatedly trying different password combinations to gain access to an account or system.

Bug: A software error that can cause unexpected behavior, sometimes creating a security vulnerability.

C

Command-and-Control (C2) Server: Used by hackers to control compromised devices in a botnet and launch attacks.

Crypto: Shorthand for cryptography (secure communication techniques) or cryptocurrency (digital currencies).

Cryptojacking: Using a device's processing power without permission to mine cryptocurrency.

D

Dark Web: A part of the internet requiring special software to access, offering anonymity but also used for criminal activity.

Data Breach: Unauthorized removal of data from a system.

Data Exposure: Protected data stored on a system without access controls, making it vulnerable.

Data Leak: Protected data escaping a system due to a vulnerability or insider access.

Deepfake: AI-generated videos, audio, or images designed to look real, often used for malicious purposes.

Def Con: A major annual hacking conference in Las Vegas.

Distributed Denial-of-Service (DDoS) Attack: Flooding a target with traffic to overload its servers and disrupt service.

E

Encryption: Scrambling data to make it unreadable without the decryption key.

End-to-End Encryption (E2EE): Secures communications so only the sender and recipient can read the message.

Escalation of Privileges: Gaining higher access rights on a system than authorized.

Espionage: Stealthy hacking aimed at spying, surveillance, and data collection.

Exploit: A method used to take advantage of a vulnerability.

Extortion: Obtaining something, typically money, through threats or intimidation.

F

Forensics: Analyzing digital data to find evidence of crimes or security incidents.

H

Hacker: Someone who alters how something works, often by exploiting vulnerabilities. Can be malicious or ethical.

Hack-and-Leak Operation: Stealing data and then publicly releasing it.

Hacktivist: A hacker who uses their skills for political or social activism.

I

Infosec: Short for information security, focused on protecting data and information.

Infostealers: Malware designed to steal sensitive information like passwords and credentials.

J

Jailbreak: Circumventing security restrictions on a device or software.

K

Kernel: The core of an operating system that controls hardware and software.

M

Malware: Malicious software designed to harm or exploit systems.

Metadata: Data that describes other data, such as file size, creation date, or location.

Multi-Factor Authentication (MFA): Requiring multiple forms of identification to verify a user's identity.

O

Operational Security (OPSEC): Practices for keeping sensitive information secret.

P

Penetration Testing: Simulating attacks to identify vulnerabilities in a system.

Phishing: Tricking users into clicking malicious links or opening infected attachments.

R

Ransomware: Malware that encrypts files and demands a ransom for decryption.

Remote Code Execution: Running code on a system remotely over a network.

S

Sanctions: Legal restrictions on interacting with entities involved in malicious cyber activity.

Sandbox: An isolated environment for testing potentially harmful code.

SIM Swap: Hijacking a phone number to gain access to online accounts.

Social Engineering: Using deception to manipulate people into divulging information or performing actions.

Spyware: Malware that monitors a user's activity and collects data.

Stalkerware: Spyware used to track someone's location, messages, and other personal information.

T

Threat Model: Identifying potential threats and vulnerabilities to develop security strategies.

U

Unauthorized: Accessing a system without permission, often illegally.

V

Virtual Private Network (VPN): Creates a secure connection over a public network, often used for privacy.

Vulnerability: A weakness in a system that can be exploited by attackers.

Z

Zero-Click Attack: A cyberattack requiring no user interaction to compromise a device.

Zero-Day: A vulnerability that is unknown to the software vendor, leaving systems unprotected.