Everything you need to know to understand CyberLite Issue 15. Read the issue here.
Zero-Day: Vulnerabilities that are unknown to the parties responsible for patching or fixing them.
VPN: A virtual private network gives you online privacy and anonymity by creating a private network from a public Internet connection. VPNs mask your Internet protocol (IP) address so your online actions are virtually untraceable by your internet service provider.
Remote Access Trojan (RAT): A malware program that includes a backdoor allowing an attacker to take remote control of the infected system.
Ransomware: Ransomware blocks access to a computer system until a sum of money is paid. It does this by encrypting all of the victim’s files. It’s increasingly common for criminals to now threaten to leak the files they’ve encrypted online to further encourage victims to pay the ransom.
Phishing: Phishing is a method of trying to gather personal information using deceptive e-mails and websites.
Repository: A repository contains all the files for a piece of software and a history of changes for each file.
HTML: Hyper Text Markup Language. HTML is the standard language for creating web pages. It describes the structure of a web page and consists of a series of elements which make up the webpages you're used to seeing.
CSS: Cascading Style Sheets. It describes how HTML elements are to be displayed on screen. It allows colours, positioning, visibility and more to be easily altered.
SQL Injection: This video from Tom Scott gives you a great primer on the basics of SQL Injection in under 10 minutes. Link.
Authentication bypass: When an attacker gains access equivalent to an authenticated user without ever going through an authentication procedure, such as entering a username and password.