Everything you need to know to understand CyberLite Issue 12. Read the issue here.
Zero-Day: Vulnerabilities that are unknown to the parties responsible for patching or fixing them.
Ransomware: Ransomware blocks access to a computer system until a sum of money is paid. It does this by encrypting all of the victim’s files. It’s increasingly common for criminals to now threaten to leak the files they’ve encrypted online to further encourage victims to pay the ransom.
Phishing: Phishing is a method of trying to gather personal information using deceptive e-mails and websites.
Bug Bounty: A reward offered to a person who identifies an error or vulnerability in a computer program or system.
Internet-of-Things: The network of physical objects - “things” that are embedded with sensors, software, and other technologies for connecting and exchanging data over the Internet.
GitHub: A platform for hosting code that enables version control (tracking and managing changes to software) and collaboration between multiple developers.
GitHub Repository: A Repository on Github contains all the files for a piece of software and a history of changes for each file.