The TechCrunch Cyber Glossary | TechCrunch


Cybersecurity is a world stuffed with technical lingo and jargon. At TechCrunch, we’ve been writing about cybersecurity for years, and even we generally want a refresher on what precisely a selected phrase or expression means. That’s why we’ve created this glossary, which incorporates a number of the most typical — and never so widespread — phrases and expressions that we use in our articles, and explanations of how — and why — we use them. 

It is a creating compendium, and we’ll replace it usually. 


The power to run instructions or malicious code on an affected system, typically due to a safety vulnerability within the system’s software program. Arbitrary code execution could be achieved both remotely or with bodily entry to an affected system (resembling somebody’s system). Within the instances the place arbitrary code execution could be achieved over the web, safety researchers sometimes name this distant code execution. 

Usually, code execution is used as a solution to plant a backdoor for sustaining long-term and protracted entry to that system, or for working malware that can be utilized to entry deeper components of the system or different gadgets on the identical community. 

(Additionally see: Distant code execution)

Botnets are networks of hijacked internet-connected gadgets, resembling webcams and residential routers, which were compromised by malware (or generally weak or default passwords) for the needs of being utilized in cyberattacks. Botnets could be made up of lots of or hundreds of gadgets, and are sometimes managed by a command-and-control server that sends out instructions to ensnared gadgets. Botnets can be utilized for a variety of malicious causes, like utilizing the distributed community of gadgets to masks and protect the web visitors of cybercriminals, ship malware, or harnessing their collective bandwidth to maliciously crash web sites and on-line companies with big quantities of junk web visitors. 

(See: Command-and-control server; Distributed denial-of-service)

A bug is basically the reason for a software program glitch, resembling an error or an issue that causes the software program to crash or behave in an sudden means. In some instances, a bug can be a safety vulnerability. 

The time period “bug” originated in 1947, at a time early computer systems had been the scale of rooms and made up of heavy mechanical and shifting gear. The primary recognized incident of a bug present in a pc was when a moth disrupted the electronics of one in every of these room-sized computer systems.

(Additionally see: Vulnerability)

Command-and-control servers (also referred to as C2 servers) are utilized by cybercriminals to remotely handle and management their fleets of compromised gadgets and launch cyberattacks, resembling delivering malware over the web and launching distributed denial-of-service assaults.

(See additionally: Botnet; Distributed denial-of-service)

Once we discuss knowledge breaches, we finally imply the improper elimination of knowledge from the place it ought to have been. However the circumstances matter and may alter the terminology we use to explain a selected incident. 

An information breach is when protected knowledge was confirmed to have improperly left a system from the place it was initially saved, and often confirmed when somebody discovers the compromised knowledge. As a rule, we’re referring to the exfiltration of knowledge by a malicious cyberattacker, or in any other case detected on account of an inadvertent publicity. Relying on what is understood in regards to the incident, we could describe it in additional particular phrases the place particulars are recognized.

(Additionally see: Knowledge publicity; Knowledge leak)

An information publicity (a sort of knowledge breach) is when protected knowledge is saved on a system that has no entry controls, resembling due to human error or a misconfiguration. This would possibly embody instances the place a system or database is related to the web however with out a password. Simply because knowledge was uncovered doesn’t imply the information was actively found, however however may nonetheless be thought of a knowledge breach. 

An information leak (a sort of knowledge breach) is the place protected knowledge is saved on a system in a means that it was allowed to flee, resembling as a result of a beforehand unknown vulnerability within the system or by means of insider entry (resembling an worker). An information leak can imply that knowledge may have been exfiltrated or in any other case collected, however there could not all the time be the technical means, resembling logs, to know for positive. 

Orchestrating a distributed denial-of-service, or DDoS, is a type of cyberattack that includes flooding targets on the web with junk net visitors in an effort to overload and crash the servers, and trigger the service, resembling a web site, on-line retailer or gaming platform. 

DDoS assaults are launched by botnets, that are made up of networks of hacked internet-connected gadgets (resembling dwelling routers and webcams) that may be remotely managed by a malicious operator, often from a command-and-control server. Botnets could be made up of lots of or hundreds of hijacked gadgets.

Whereas a DDoS is a type of cyberattack, these data-flooding assaults should not “hacks” in themselves as they don’t contain the breach and exfiltration of knowledge from their targets, however as an alternative trigger a “denial of service” occasion to the affected service.

(Additionally see: Botnet; Command-and-control server)

Most trendy techniques are protected with a number of layers of safety, together with the power to set person accounts with extra restricted entry to the underlying system’s configurations and settings. This prevents these customers — or anybody with improper entry to one in every of these person accounts — from tampering with the core underlying system. Nonetheless, an “escalation of privileges” occasion can contain exploiting a bug or tricking the system into granting the person extra entry rights than they need to have. 

Malware also can make the most of bugs or flaws attributable to escalation of privileges by gaining deeper entry to a tool or a related community, probably permitting the malware to unfold.

An exploit is the way in which and means by which a vulnerability is abused or taken benefit of, often in an effort to break right into a system. 

(Additionally see: Bug; Vulnerability)

Brief for “data safety,” another time period used to explain defensive cybersecurity centered on the safety of knowledge and knowledge. “Infosec” could also be the popular time period for business veterans, whereas the time period “cybersecurity” has change into broadly accepted. In trendy occasions, the 2 phrases have change into largely interchangeable. 

Jailbreaking is utilized in a number of contexts to imply using exploits and different hacking strategies to bypass the safety of a tool, or eradicating the restrictions a producer places on {hardware} or software program. Within the context of iPhones, for instance, a jailbreak is a way to take away Apple’s restrictions on putting in apps exterior of its so-called “walled backyard,” or to realize the power to conduct safety analysis on Apple gadgets, which is generally extremely restricted. Within the context of AI, jailbreaking means determining a solution to get a chatbot to give out data that it’s not speculated to

Malware is a broad, umbrella time period that describes malicious software program. Malware can land in lots of types and be used to use techniques in numerous methods. As such, malware that’s used for particular functions can typically be known as its personal sub-category. For instance, the kind of malware used for conducting surveillance on folks’s gadgets can be referred to as “spyware and adware,” whereas malware that encrypts recordsdata and calls for cash from its victims additionally goes by “ransomware.”

(Additionally see: Spy ware)

Metadata is data about one thing digital, somewhat than its contents. That may embody particulars in regards to the dimension of a file or doc, who created it, and when, or within the case of digital photographs, the place the picture was taken and details about the system that took the picture. Metadata could not establish the contents of a file, however could be helpful in figuring out the sourcing of the place a doc got here from or who authored it. Metadata also can confer with details about an alternate, resembling who made a name or despatched a textual content message, however not the contents of the decision or the message themselves.

Distant code execution refers back to the potential to run instructions or malicious code (resembling malware) on a system from over a community, typically the web, with out requiring any human interplay. Distant code execution assaults can vary in complexity, however could be extremely damaging vulnerabilities when exploited.

(Additionally see: Arbitrary code execution)

A broad time period, like malware, that covers a variety of surveillance monitoring software program. Spy ware is often used to confer with malware made by personal firms, resembling NSO Group’s Pegasus, Intellexa’s Predator, and Hacking Workforce’s Distant Management System, amongst others, which the businesses promote to authorities companies. In additional generic phrases, these kind of malware are like distant entry instruments, which permits their operators — often authorities brokers — to spy and monitor their targets, giving them the power to entry a tool’s digital camera and microphone, or exfiltrate knowledge. Spy ware can be known as industrial or authorities spyware and adware, or mercenary spyware and adware.

(Additionally see: Stalkerware)

Stalkerware is a type of surveillance malware (and a type of spyware and adware) that’s often offered to extraordinary customers beneath the guise of kid or worker monitoring software program however is commonly used for the needs of spying on the telephones of unwitting people, oftentimes spouses and home companions. The spyware and adware grants entry to the goal’s messages, location, and extra. Stalkerware sometimes requires bodily entry to a goal’s system, which supplies the attacker the power to put in it straight on the goal’s system, actually because the attacker is aware of the goal’s passcode. 

(See: Spy ware)

What are you making an attempt to guard? Who’re you nervous about that might go after you or your knowledge? How may these attackers get to the information? The solutions to those sorts of questions are what is going to lead you to create a menace mannequin. In different phrases, menace modeling is a course of that a corporation or a person has to undergo to design software program that’s safe, and devise strategies to safe it. A menace mannequin could be centered and particular relying on the scenario. A human rights activist in an authoritarian nation has a unique set of adversaries, and knowledge to guard, than a big company in a democratic nation that’s nervous about ransomware, for instance. 

Once we describe “unauthorized” entry, we’re referring to the accessing of a pc system by breaking any of its safety features, resembling a login immediate, a password, which might be thought of unlawful beneath the U.S. Pc Fraud and Abuse Act, or the CFAA. The Supreme Court docket in 2021 clarified the CFAA, discovering that accessing a system missing any technique of authorization — for instance, a database with no password — shouldn’t be unlawful, as you can’t break a safety characteristic that isn’t there. 

It’s price noting that “unauthorized” is a broadly used time period and infrequently utilized by firms subjectively, and as such has been used to explain malicious hackers who steal somebody’s password to interrupt in by means of to incidents of insider entry or abuse by staff. 

A vulnerability (additionally known as a safety flaw) is a sort of bug that causes software program to crash or behave in an sudden means that impacts the safety of the system or its knowledge. Generally, two or extra vulnerabilities can be utilized along side one another — often called “vulnerability chaining” — to realize deeper entry to a focused system. 

(Additionally see: Bug; Exploit)

A zero-day is a selected kind of safety vulnerability that has already been found or exploited, however that the seller who makes the affected {hardware} or software program has been given no time (or “zero days”) to repair the issue. As such, there could also be no fast repair or mitigation to stop an affected system from being compromised. This may be significantly problematic for internet-connected gadgets. 

(Additionally see: Vulnerability)

Leave a Reply

Your email address will not be published. Required fields are marked *