Cyber Security term 36: Trojan horse
The Trojan Horse is a malicious program that’s like the Trojan horse from the myth. The trojan horse acts like a backdoor for the attacker. […]
The Trojan Horse is a malicious program that’s like the Trojan horse from the myth. The trojan horse acts like a backdoor for the attacker. […]
Social Engineering happens when a hacker tricks a user into giving them information. A social engineer is a person that finds an individual user and […]
A script kiddie is a word used for the beginners in hacking and cracking. Since they are a beginner they don’t have the skill to […]
The word Rootkit has been derived by two words. The word ‘root’ which means total control over the system administrator rights by bypassing the authentication […]