adj
(computer security, of a system) Physically isolated from the Internet or some other unsecured network.
adj
(computing, dated) of a program that steals whatever resources it needs without consideration for other tasks.
n
(computing) An attempt to exploit a vulnerability in a computer system.
n
A path or method used by a hacker to gain access to a target system, such as a computer or network server.
n
(computer security) A type of denial-of-service attack which is aimed at parsers of XML documents.
n
(computer security) The practice of secretly installing a back door on a mobile phone and then remotely monitoring conversations by means of Bluetooth technology.
n
One who anonymously sends messages to a device using the Bluetooth system.
n
(Internet, computer security) A collection of compromised computers that is gradually built up and then unleashed as a DDOS attack or used to send very large quantities of spam.
n
(chiefly computing) An approach that copies an existing successful approach without properly analysing and understanding it.
v
(Internet) To steal confidential information from a user who is browsing a website.
n
(computing) A computer program that is innocently fooled by some other party into misusing its authority.
n
(computing) A kind of cyberattack in which a large batch of account credentials stolen from one service are tried against another service in an attempt to log in.
n
(computing) A particular security exploit against secret Web cookies over connections using the HTTPS and SPDY protocols that also use data compression. It relies on observing the change in size of the compressed ciphertext for various inputs.
n
(computing) An attack on an unattended device, in which a person with physical access alters it in some undetectable way so that they can later secretly access it again.
n
(computing) A program or technique that exploits a vulnerability in other software.
n
(Internet) A technique for blocking spam (junk e-mail) by temporarily rejecting mail from unknown senders. A legitimate sender is likely to try sending again after a delay.
n
(computing) Malicious software that commandeers other software, especially a web browser, so as to affect its behaviour.
n
(computer security) A trap set to detect or deflect attempts at unauthorized use of information systems.
n
(computing) An incorrect password published as part of a honeypot, so that any user attempting to log in with the password may be assumed to be an attacker.
n
The act of stealing information from mobile devices by placing a data-stealing device that appears to be a charging station in a place where passers-by are likely to plug their devices into it.
n
(computing) licensed penetration tester
n
(cryptography, computer security) The malicious party in examples of threat scenarios. See Alice and Bob.
n
(Internet) An automated software agent that moderates a discussion forum by removing unacceptable postings, etc.
v
(computing) To breach security by overwriting data that is not intended for user input.
n
(computing) The functional part of a computer virus or another type of malware program, rather than the part that spreads it.
n
(computing, informal) A penetration test.
n
(computing) A test of a computer system's access control, in which a user attempts to gain access to the system without the prescribed credentials.
n
(computing) The malicious act of keeping a false website or sending a false e-mail with the intent of masquerading as a trustworthy entity in order to acquire sensitive information, such as usernames, passwords, and credit card details.
n
(computing) The illicit copying of data from an unattended personal computer by plugging in a portable storage device
n
Alternative spelling of pod slurping [(computing) The illicit copying of data from an unattended personal computer by plugging in a portable storage device]
n
(computing) A man-in-the-middle exploit that takes advantage of Internet and security software clients' fallback to an older version of SSL.
n
(Internet slang, computer security, originally leetspeak) An exploit in computer security.
n
(computer security) An attempt to subvert security by recording legitimate communications and repeating them to try to impersonate a valid user.
n
(computing) Alternative spelling of rootkit [(computer security) A set of software tools used by a third party to gain unauthorized access to a computer system and control the system while concealing itself from the user.]
n
(computing) An attack against a system that consists of many minor actions (such as stealing small amounts of funds from multiple bank accounts) and is thus relatively difficult to detect.
n
A hardware system that prevents unauthorised intrusion into a premises, and reports such attempts.
n
(computer security) An attack which redirects requests - be it network or memory accesses - to a new location defined by the attacker.
n
(computer security) A method used to crack the password of a touchscreen device by analysing the oily smears left on the device's screen by the user's fingers.
n
(computer security) The practice of tricking a user into giving, or giving access to, sensitive information, thereby bypassing most or all protection.
v
(transitive, by extension, video games) To do something rapidly and repeatedly.
n
(computing) Text inserted into an email address in order to make it invalid, though still readable to a human being. For example, in "jsmith-[AT]-example-[DOT]-com", the "@" and "." symbols have been replaced with literal text to prevent automated spambots from finding the email address while still leaving it readable.
n
(computer security) A honeypot used to collect spam.
n
Alternative form of spearphishing [(Internet) Phishing against a small group of selected targets who are more likely to be attracted.]
n
(computing) A method of attacking a computer program, in which the program is modified so as to appear to be working normally when in reality it has been modified with the purpose of circumventing security mechanisms.
n
(computer security) The exploitation of a buffer overflow affecting the stack.
v
(computer security) To install a Trojan horse.
adj
(computing) More likely to be exposed to malicious programs or viruses.
n
(computing) A computer attack strategy, in which the victim is a particular group (organization, industry, or region), and the attacker guesses or observes which websites the group often uses and infects one or more of them with malware.
n
(computing, idiomatic) vulnerability that has been discovered recently, and is yet unpatched or unmitigated; zero-day vulnerability
n
(computing) The act of exploiting a security vulnerability on the same day it becomes publicly known.
n
(computing) A computer affected by malware which causes it to do whatever the attacker wants it to do without the user's knowledge.
Note: Concept clusters like the one above are an experimental OneLook
feature. We've grouped words and phrases into thousands of clusters
based on a statistical analysis of how they are used in writing. Some
of the words and concepts may be vulgar or offensive. The names of the
clusters were written automatically and may not precisely describe
every word within the cluster; furthermore, the clusters may be
missing some entries that you'd normally associate with their
names. Click on a word to look it up on OneLook.
Our daily word games Threepeat and Compound Your Joy are going strong. Bookmark and enjoy!
Today's secret word is 7 letters and means "No longer existing; died out." Can you find it?