Terms often used in discussions of cyber security, briefly defined. Your corrections, suggestions, and recommendations for additional entries are welcome: email the editor at editor@thecyberwire.com.
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. It's all in the details, folks. Pay attention to ...
In this episode of the Microsoft Threat Intelligence Podcast host Sherrod DeGrippo is joined by the authors of the new book The Definitive Guide to KQL: Using Kusto Query Language for Operations, ...
An unskilled hacker who uses scripts written by others to attack systems. Stereotypically, script kiddies are young people attempting to impress others with their hacking skills. "script kiddie" on ...
A forensic technique where practitioners capture an entire image of a system and analyze the contents offline. "dead-box forensics" on the Word Notes podcast.
A security awareness training technique that uses simulated phishing emails to test user security awareness and generate feedback for users and their organization. "simulated phishing" on the Word ...
A phishing attack that uses a malicious QR code instead of a link or an attachment. "QR code phishing" on the Word Notes podcast.
A protracted form of social engineering in which the criminals cold-call prospective victims, and then spend considerable time and effort in securing the victims' trust and developing rapport with ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. Welcome, witches, wizards, and cybersecurity ...
In anti-phishing training, the percentage of users tested who took one of the following unsafe actions in response to a simulated phishing email: clicking the embedded link, entering data on a landing ...
Software designed to prevent cheating in video games. "anti-cheat software" on the Word Notes podcast.