Definitions of IT Terms

Black Hat Hacker – Black hat refers to a hacker who breaks into a computer system or network with malicious intent. A black hat hacker may exploit security vulnerabilities for monetary gain to steal or destroy private data; or to alter, disrupt or shut down websites and networks. The black hat hacker may also sell these exploits to other criminal organizations.

Cybersecurity – Computer security or IT security is the protection of computer systems from the theft and damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide.

Dark Web – The part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.

Malvertising – Injects malware into legitimate online advertising networks to deliver malware to visitors that captures credentials.

Phone Hacking – Is the action or practice of gaining unauthorized access to data stored in another person's phone, especially in order to access their voicemail. In the case of phone systems it is the use of someone else’s phone system without permission, especially in order to listen to messages, or make outgoing phone calls.

Phishing – Is sending emails disguised as legitimate messages to trick users into disclosing credentials or delivers malware which captures credentials.

Shimmers – Target the chips on your ATM cards. They are wafer-thin fraud devices designed to fit invisibly inside the ATM card slot and are able to transmit stolen card data wirelessly via infrared. Similar to the signal of your TV remote control.

SMiShing – Or "Smishing," is a security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto his cellular phone or other mobile device. SMiShing is short for "SMS phishing".

Spoofing – Is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.

White Hat Hacker – A white hat hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks. However, unlike black hat hackers, white hat hackers respect the rule of law as it applies to hacking.