BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

Virus

CISA defines a virus as a malicious program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself. A virus infecting devices or networks can often lead to detrimental effects, including data corruption, unauthorized access, and system instability. Unlike other [...]

2024-10-10T12:13:15+01:00July 6th, 2023|

Vishing

Vishing is short for "voice phishing," a type of cyberattack which involves fraudulent use of phone calls or voice messages to steal confidential information from victims. How Vishing Works Vishing involves an attacker impersonating a legitimate, usually trusted, entity, such as a bank, government agency or trusted authority. The goal of the attacker [...]

2024-10-09T16:35:24+01:00July 6th, 2023|

Vulnerability

In cybersecurity, a vulnerability is a weakness or flaw in an IT system, application or network that can be exploited by an attacker to gain unauthorized access, disrupt operations, or compromise data integrity. Vulnerabilities can exist in various forms, including software bugs, misconfigurations, or insufficient security measures, and they pose significant risks to organizations [...]

2024-10-14T13:51:03+01:00March 8th, 2023|

Whaling

Whaling is a highly targeted phishing method used by cybercriminals who masquerade as a senior executive in an organization and directly target other senior or important individuals within that organization. The aim is to steal money, access sensitive information or gain access to computer networks and systems. How whaling works The aim of [...]

2024-10-14T13:47:15+01:00March 8th, 2023|

Whitelist (Allowlist)

Also known as an allow-list, is a cybersecurity strategy which approves email addresses, IP addresses, domain names or application, denying access to others. Users can only gain access to the whitelisted items.

2024-10-14T13:43:58+01:00September 21st, 2022|

Worm Virus

A worm virus, known more commonly as a “worm” is a malicious program whose primary function is to self-replicate, automatically spreading through a network, without human intervention, while remaining active on infected systems. Worms can cause significant damage to both systems and networks.

2024-10-14T13:36:07+01:00July 5th, 2023|

Zero-Day Threat

A zero-day threat (also known as a zero-day exploit) is when a threat actor discovers a cybersecurity vulnerability that is not known to the software vendor. It is called a zero-day threat as once the vulnerability has been discovered; developers have "zero days" to create a fix for it. This type of vulnerability is [...]

2024-10-14T13:28:23+01:00November 1st, 2022|