Podcast
Questions and Answers
Ethical Hackers (White hat hackers)
Ethical Hackers (White hat hackers)
good hackers, defenders. Works for the benefit of the public.
Grey hat hacker
Grey hat hacker
between the lines of good and bad hacker. Possibly rehabilitated.
Black hat hackers and cyberterrorists
Black hat hackers and cyberterrorists
Black hat hacker: criminals Cyberterrorists: hackers that are terrorists. Destroy targets and cause physical harm (to the person using the target device). Sometimes their actions are not stealthy. Cyberterrorists aim to cause actual physical injury or danger, going beyond just digital damage.
Botnet
Botnet
Storm botnet
Storm botnet
Conficker botnet
Conficker botnet
Mirai botnet
Mirai botnet
How to put machines into a domain
How to put machines into a domain
tools and activities used to develop malware
tools and activities used to develop malware
A Trojan, or Trojan horse
A Trojan, or Trojan horse
Android malware
Android malware
Dropper
Dropper
Payload
Payload
Ransomware
Ransomware
Scareware
Scareware
Ransomware-as-a-Service (RaaS)
Ransomware-as-a-Service (RaaS)
Hactivism
Hactivism
Online shaming
Online shaming
Mass surveillance
Mass surveillance
mass surveillance(tempora)
mass surveillance(tempora)
mass surveillance(Muscular)
mass surveillance(Muscular)
mass surveillance(XKeyscore)
mass surveillance(XKeyscore)
Identity theft
Identity theft
Theft of service
Theft of service
Network intrusion or unauthorized access
Network intrusion or unauthorized access
Posting and/or transmitting illegal material
Posting and/or transmitting illegal material
Fraud
Fraud
Embezzlement
Embezzlement
Dumpster Diving
Dumpster Diving
DoS (Denial of Service) /DDoS (Distributed Denial of Service)
DoS (Denial of Service) /DDoS (Distributed Denial of Service)
Cyberstalking/Cyberbullying
Cyberstalking/Cyberbullying
Cyberterrorism
Cyberterrorism