Cookie
A Cookie, or web cookie, is a small data file used by computers to track website communications and sessions. When you visit a website, it sends a cookie to your …
A Cyber Library of 300+ Cybersecurity Terms.
A Recovery Point Objective (RPO) is the maximum amount of data that your company is willing to lose in a disaster. Most businesses backup their data at specific intervals (hourly, …
A Recovery Time Objective (RTO) is a metric used to measure how fast you can recover your IT infrastructure and services following an incident or outage (business continuity). RTO is …
reCAPTCHA is a (presently) free security tool from Google which helps separate automated Bots from real humans wanting to interact with your website whether to purchase, query, complete a form. or register for something. Enabling reCAPTCHA can greatly reduce nuisances in your website from hackers and provide SMBs peace-of-mind.
When -planning for risks to your small to medium sized business, you need to include data backups and recovery processes. Test that these work at least annually and be aware that some new hacking attacks cannot be addressed by simply restoring data from a strong backup strategy because of threats to your data’s confidentiality.
Eavesdropping in the cybersecurity world refers to the interception of communication between two parties by a malicious third party (hackers). Eavesdropping is similar to a sniffing attack, where software applications …
A POS Intrusion is an attack that happens at the Point-of-Sale device. The POS device in retail stores process credit card transactions at check out. Newer devices allow you to …
Cyber Espionage is a cyber attack that leads to stolen classified, sensitive, or critical data often in the form of intellectual property in order to gain a competitive advantage over …
Examining the data you collect to run your business can lead to greater efficiency, shorter periods of down-time, and better predictive models surrounding demand for your products and services. This is known as data mining.
Whether you like it or not, you and your business are part of an online Cybersecurity ecosystem. There are predators (hackers) and the hunted (businesses and individuals). You can sit passively and idly by hoping no predators see you, or you can build your defenses by training your employees and evaluating your cybersecurity maturity to ensure you can run faster than the person or business next to you. Inaction is no longer an option. Do something at CyberHoot.com.
Account Hijacking is where a hacker compromises a computer account that does not belong to them. Often these account hijackings are email accounts because they contain so much rich and …
Password Sniffing is a hacking technique that uses a special software application that allows a hacker to steal usernames and passwords simply by observing and passively recording network traffic. This …
An Influencer is someone who creates or promotes content on the Internet to a group of social media followers (subscribers) via a variety of websites. The term Influencer is a …
Closed Source is software that is generally not free, where the source code is safe and encrypted. Contrary to Open Source, Closed Source can’t copy, modify, or delete parts of …
Open source software (OSS), unlike proprietary software, is software that keeps the code open so IT professionals can alter, improve, and distribute it. Popular Open Source software examples include Mozilla’s …
Software development has come a long way from the days of mechanical switches, punch cards, and the potential for a moth (Bug) in your machine. Today development programs usually follow one of two methodologies: waterfall or agile development. This article provides a quick layman’s overview of Waterfall development methodology.
The Agile Development Methodology refers to a practice that uses continuous improvement and testing in software application development processes. Within the Software Development Life Cycle, there are a couple methodologies …
Software Development Life Cycle (SDLC) is the process companies follow to produces quality software in an efficient, supportable, and timely way. SDLC has undergone as many changes over the last …
Development shops need to practice safe and secure coding. The best way to get your developers all on the same page is to train them in the Top 10 most common security mistakes made in coding. Visit CyberHoot.com’s blog article here on OWASP Top 10 coding errors that lead to insecure applications.
Impersonation email phishing attacks are rampant online. Do not trust an External email from your CEO or CFO if it seems unexpected, urgently needs your attention, and seems off in some unexplainable way. Pick up the phone and call that person or send them a separate text message (not email) to confirm their request.
Ransomware has been the scourge of businesses for many years. MSP’s and SMB’s have sought to protect themselves with strong backups rather than educating users in many cases. With the MAZE ransomware, hackers have upped the ante for SMB’s by exporting the data and threatening to release it to the public Internet exposing that data and breaching its confidentiality. Train employees to spot and avoid these attacks rather than rely on your backups or you will be paying these bitcoin ransom extortion requests.
Rainbow tables are mostly dead today, but not all dead. Salting and iterative hashing functions have made rainbow tables obsolete when used. However, there are hundreds of thousands of websites and password databases that do not use password salting and iterative hashing making a rainbow table useful for hackers in these situations.
Adversary-In-The-Middle (AitM) attacks are a hacker staple. They are commonly used on rogue WiFi networks where unsuspecting free WiFi users unencrypted traffic can be intercepted by these MITM attacks.
Web applications are rapidly eclipsing desktop application installs. However, each web application has an exposure to Session Hijacking not present on a desktop installed software product. Learn all about this attack vector with online applications at CyberHoot.com.
Online applications that allow for password logins, database searches, and forms completion will need to validate the input they allow to prevent excessive input data that could overflow the system buffers receiving such inputs. Otherwise, code can be injected to run on these systems through these missing input validation coding errors as buffers overflow.
HMAC Authentication is short for Hash-Based Message Authentication Code, a strategy used to verify the integrity and authenticity of a message. This strategy is different from other authenticaton methods in …
The Internet of Things (IoT) is any device or machine that has the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. IoT is essentially any …
When hackers are in possession of a large set of usernames and passwords, they perform credential stuffing attacks on popular websites, slowly enough to evade failed password login monitoring solutions. Over time they will amass a treasure trove of compromised credentials which they can sell on the dark web for a tidy profit or they can use those credentials to cause significant damage to the original account holder.
Passwords are toxic data. They require very careful handling to avoid a major security incident from taking your company down. Salting and hashing those passwords recursively is critical to your application authentication success. Learn more about this at CyberHoot.com.
Commercial Off-The-Shelf (COTS) in cybersecurity is a computer hardware or software product made for nearly any user because it is available to the general public for purchase. COTS products are …
Anti-Malware is a solution that maintains computer security and protects sensitive data that is transmitted by a network or stored on local devices. Anti-malware tools employ signature based scanning strategies …
MAZE Ransomware represents a change for the worse in the capabilities of online hackers today. Traditional backup strategies are no longer enough to provide a get-out-of-jail-free card when hit with ransomware. Data confidentiality is also at risk now and that changes who will pay ransoms dramatically. Prepare now to avoid this scourge of online hacking.
Links in email can lead to malicious websites that push malware to your computer or attempt to steal your credentials when you visit a look-alike website that prompts for a familiar looking login. To address this risk, Anti=SPAM email security gateways and providers have implemented a URL rewrite technique to proxy connections to these websites after inspection by the Vendor reveals them to be safe. This technology is called by many different names including: Safe Links (Microsoft), URL Protection (Mimecast), and Link Protection (Great Horn).
End-of-Life (EOL)/End-of-Support(EOS) describe the final stage of a product’s lifecycle. Once a product reaches EOL/EOS, developers stop updating and patching the product and it is no longer maintained. Software development …
Remote Monitoring and Management (RMM) is a set of Information Technology (IT) tools that are installed into client workstations and servers. RMM tools gather information on installed applications, hardware performance, …
Monthly Recurring Revenue (MRR) is the most important topic for Managed Service Providers (MSPs). MRR is the lifeblood of MSPs and services they can bring into their portfolio of service …
Data Classification is about categorizing data into buckets to make it easier to retrieve, restrict access to, and protect. Data classification is important for businesses protect data according to its …
Contact Tracing is a medical term which describes a process used to identify, trace, and contact people potentially exposed to highly a infection contagion such as the Coronavirus in highly …
Zoom Bombing is where an unauthorized person enters your Zoom video conference to cause disruptions or to gain sensitive information. Many companies and schools have begun using video conferencing extensively …
Elliptic Curve Cryptography (ECC) is a public key encryption method that is based on elliptic curve theory that is used to create faster, smaller, and more efficient cryptographic keys. Historically, …
White Box Testing is a form of penetration testing which tests internal structures of an application, as opposed to the applications functionality (also known as Black Box Testing). Programming skills …
A Fragment Overlap Attack, also known as an IP Fragmentation Attack, is an attack that is based on how the Internet Protocol (IP) requires data to be transmitted and processed. …
An Infrastructure as a Service (IaaS) is a cloud based service that helps companies build and manage their data as they grow, paying for the storage and server space that …
A Platform as a Service (PaaS) is a type of cloud computing, similar to Software as a Service (SaaS), where a service provider delivers a platform to clients, enabling them …
Steganography (pronounced: steh·guh·naa·gruh·fee) is the technique of hiding data secretly within an ordinary, non-secret, file or message in order to avoid detection. The use of steganography can be combined with …
Software as a Service (SaaS) is a cloud-based service where instead of downloading software to your desktop PC or business network to run and update, you instead access an application …