Macro Virus
Macro Virus: A type of malware that spreads through infected documents or files containing macro commands. It automates actions to perform malicious tasks, such as deleting files or stealing sensitive information. Examples include the Melissa virus, which spread through email attachments.
Network Attached Storage (NAS)
Network Attached Storage (NAS): A type of dedicated file storage technology that provides local area network nodes with file-based shared storage through a standard Ethernet connection. It allows more hard disk storage space to be added to a network that already exists. Because the stored data is not located on any of the network’s client […]
Land Attack
Land Attack: A type of denial of service (DoS) attack that involves sending a forged packet to a device with the same source and destination IP address and port number. As the device tries to respond to this unusual packet, it enters a loop of repeated actions that can cause the system to slow down […]
Lightweight Directory Access Protocol (LDAP) Injection Attack
Lightweight Directory Access Protocol (LDAP) Injection Attack: An attack that exploits a vulnerability in LDAP-enabled applications by injecting malicious LDAP statements into user input. It is used to gain unauthorized access to sensitive data or perform malicious actions. Examples include modifying LDAP queries to bypass authentication or retrieve sensitive information.
Limited Maintenance
Limited Maintenance: The practice of providing only essential updates and fixes to a product or system, typically one that is nearing the end of its life cycle. During this stage, changes to the product or system are minimized and are usually focused on addressing critical vulnerabilities or significant operational issues. This practice is usually applied […]
Keylogger
Keylogger: A type of software or hardware device used to track and record keystrokes on a computer or device. It is used to monitor user activity and capture sensitive information such as passwords and credit card numbers. Examples of keyloggers include malware-based keyloggers, hardware-based keyloggers, and keylogger software for parental control.