Concept cluster: Graphics and sound > Cyber threats and attacks (2)
n
Unauthorized access to the information on a wireless device through a Bluetooth connection, often between phones, desktops, laptops, or PDAs.
n
(Internet, computer security) A large collection of compromised systems exploited for malicious purposes.
n
(computing) A particular security exploit against HTTPS when using HTTP compression, based on the CRIME exploit.
v
(computing, idiomatic, figuratively) To deliberately overwhelm a web server through a cyberattack such as a DDOS, such that the server goes offline or is in danger of doing so.
v
(computing) To break a password, encryption, or any other protection mechanism by brute force.
n
(computing) A program which can covertly transmit itself between computers via networks (especially the Internet) or removable storage such as disks and USB drives, often causing damage to systems and data.
n
(computer security) An exploit of a website where unauthorised commands are transmitted from a user that the website trusts.
n
(computer security) An exploit that involves tricking a victim into executing a malicious script in a target website.
n
(Internet, neologism) The malicious practice of tricking a user into clicking a visual element they did not intend to click, by manipulating the cursor's apparent location.
n
(Internet) Traffic to a website that is miscategorized by analytics software because it lacks data points such as the origin of the users.
n
(computer security) A successful cyberattack to obtain sensitive data.
n
(computer security) Accidental exposure of sensitive data.
n
(Internet) A type of network computer attack that attempts to render a particular service (e.g. web site) unavailable to its audience.
n
(Internet) An attack that uses a list of words (from a dictionary) to try to guess passwords or decryption keys
n
(cybersecurity) An attack in which the attacker causes a system to move from an allowed path or directory to one which is meant to be private via path change commands.
n
(computing, Internet) A denial-of-service attack.
n
(computer security, Internet) A download triggered by scripts etc. on a website, without prompting the user, usually for malicious purposes.
n
(computing) A software component designed to install malware on a target system.
n
(computing, security) A particular variation of the smurf attack, using UDP traffic bearing the victim's spoofed IP address sent to certain standard ports.
n
(computing) A security bug in OpenSSL, where more data can be read than should be allowed, which was disclosed and fixed in April 2014.
n
(computing) Hijackware.
n
(computer security) An exploit where the attacker makes the victim log into a system using the attacker’s credentials.
n
(attributive, Internet) A form of Internet security threat, a proxy Trojan horse that infects a web browser and covertly modifies web pages or transactions.
n
(computer security) A cross-site scripting attack where the malicious script is a permanent part of a web page.
n
(computing) The use of a Sybil attack.
n
(computer security) A cross-site scripting attack where the malicious script is relayed to the victim in an e-mail or as a URL parameter.
n
(computer security) A set of software tools used by a third party to gain unauthorized access to a computer system and control the system while concealing itself from the user.
n
(computer security) A security vulnerability in a computer system.
n
(computing) A similar software system that prevents unauthorised access.
n
(computer security) A cross-site scripting attack where the attacker uses social engineering to trick the victim into executing the malicious script.
n
(computer security) An exploit where the attacker sets or finds out the victim's session identifier.
n
(computer security) A type of exploit where a victim’s session id is stolen, allowing the attacker to access a service the victim is logged into.
n
(computing, Microsoft Windows) A means of bypassing security restrictions between processes in a session by having a less privileged process inject code into the message loop of a more privileged one.
n
(computing) A small piece of code, used as the payload of a virus or other malware, that launches a shell so that the attacker can control the compromised computer.
n
(chiefly computer security) The use of direct observation, such as looking over someone's shoulder at an ATM, in order to obtain information.
n
(computing, security) A smurf attack.
n
(computer security) A largely obsolete form of denial-of-service attack, involving broadcasting ICMP packets with the intended victim's IP address to a large computer network, causing the victim's computer to be overwhelmed by the response packets from the network.
n
(computing) A piece of spyware.
n
(Internet) Programs that surreptitiously monitor and report the actions of a computer user.
n
(computing) An attack that subverts a reputation system by forging identities in peer-to-peer networks.
n
(Internet) A denial-of-service attack in which the attacker sends a succession of SYN (synchronization) requests to the target system in an attempt to consume its resources and make the system unresponsive to legitimate traffic.
n
(computing) Malware that appears to perform or actually performs a desired task for a user while performing a harmful task without the user's knowledge or consent.
n
(computing, proscribed) Any type of malware.
n
(Internet) A malicious bot (automated user) designed to disrupt other users' activity.
n
(computer security, Internet) A shell-like interface for issuing commands to a compromised server.

Note: Concept clusters like the one above are an experimental OneLook feature. We've grouped words and phrases into thousands of clusters based on a statistical analysis of how they are used in writing. Some of the words and concepts may be vulgar or offensive. The names of the clusters were written automatically and may not precisely describe every word within the cluster; furthermore, the clusters may be missing some entries that you'd normally associate with their names. Click on a word to look it up on OneLook.
  Reverse Dictionary / Thesaurus   Datamuse   Compound Your Joy   Threepeat   Spruce   Feedback   Dark mode   Help


Our daily word games Threepeat and Compound Your Joy are going strong. Bookmark and enjoy!

Today's secret word is 10 letters and means "Practical approaches prioritizing results, efficiency." Can you find it?