{"id":68641,"date":"2022-10-19T07:58:00","date_gmt":"2022-10-19T14:58:00","guid":{"rendered":"https:\/\/blog.mozilla.org\/?p=68641"},"modified":"2022-10-19T13:50:55","modified_gmt":"2022-10-19T20:50:55","slug":"cyberattacks-glossary-of-terms-ransomware-ddos","status":"publish","type":"post","link":"https:\/\/blog.mozilla.org\/en\/internet-culture\/cyberattacks-glossary-of-terms-ransomware-ddos\/","title":{"rendered":"A glossary of terms about cyberattacks, from ransomware to DDoS"},"content":{"rendered":"\n<p>If you read news about technology, you&#8217;re bound to run into some jargon. Here at Mozilla, we believe that information should be as accessible as possible regardless of your level of expertise. We want to help you approach stories about technology with more curiosity and with a little less head-scratching involved. We&#8217;ll break down headline-making topics through a glossary of terms often used to discuss them. Consider it your cheat sheet to all things tech.<\/p>\n\n\n\n<p>This month, we&#8217;ll give you terms to know about cyberattacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>First, let\u2019s define a cyberattack<\/strong><\/h2>\n\n\n\n<p>A cyberattack is an effort to target a computer network or remotely cause damage, whether that\u2019s stealing information like credit card numbers or disabling systems. Everything from the websites we visit to the apps we use to our communications online are vulnerable.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Other terms to know:&nbsp;<\/strong><\/h2>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Brute force attack<\/strong><\/h3>\n\n\n\n<p>An attacker uses software to generate password combinations to get into an account or a system.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>DoS and DDoS attacks<\/strong><\/h3>\n\n\n\n<p>Let\u2019s say you own a flower shop. A group of people, with no intention of buying flowers, crowds the entrance. Now, real customers can\u2019t go inside.&nbsp;<\/p>\n\n\n\n<p>A denial-of-service attack, or DoS attack, works similarly. A hacker floods a server or network with useless traffic so a website becomes inaccessible to people who want to visit the site. A distributed denial-of-service attack, or DDoS attack, deploys traffic from thousands of different sources so it\u2019s harder to stop.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Malware<\/strong><\/h3>\n\n\n\n<p>Short for malicious software, malware generally refers to any program designed to take harmful actions against a computer system or network. They steal data or money, bypass security systems and disrupt an organization&#8217;s operations. Malware can hit targets via phishing or taking advantage of vulnerabilities in a system.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Monster-in-the-middle attack<\/strong><\/h3>\n\n\n\n<p>A monster-in-the-middle attack intercepts data between two devices. A hacker could gain access to email accounts, or hijack a Wi-Fi connection or traffic between a computer and a website.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Phishing<\/strong><\/h3>\n\n\n\n<p>Attackers pretend to be a trustworthy entity via email or a fake website to get you to provide personal information to access your accounts, like your bank or your work network. They may advantage of events like natural disasters (<a href=\"https:\/\/www.hopkinsmedicine.org\/mediaII\/katrina\/scams.html\" target=\"_blank\" rel=\"noreferrer noopener\">sham payouts after Hurricane Katrina<\/a>), economic downturns (<a href=\"https:\/\/www.irs.gov\/compliance\/criminal-investigation\/irs-warns-about-covid-19-economic-impact-payment-fraud\" target=\"_blank\" rel=\"noreferrer noopener\">IRS scams<\/a>) or holidays (<a href=\"https:\/\/www.fbi.gov\/scams-and-safety\/common-scams-and-crimes\/holiday-scams\" target=\"_blank\" rel=\"noreferrer noopener\">fraudulent shopping deals<\/a>). Clues of a phishing attack include suspicious email addresses and attachments, as well as spelling and grammatical errors in the copy.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Ransomware<\/strong><\/h3>\n\n\n\n<p>Hackers use ransomware<strong> <\/strong>to encrypt files on a device or system so that they\u2019re unusable until an entity or organization meets a demand, e.g. money. Attackers asks for a ransom in exchange for decrypting the files and may also threaten to sell or leak data..<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>SQL injections<\/strong><\/h3>\n\n\n\n<p>A common hacker trick, a structured query language or SQL injection is used to steal usernames and passwords, credit card numbers and other data entered into a web form. The attacker inserts or modifies code in a vulnerable database to command access to the sensitive information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Worms<\/strong> <strong>and viruses<\/strong><\/h3>\n\n\n\n<p>Like in the 1988 Morris attack, worms are malware that can spread via a network connection. They don\u2019t need a host to self-replicate, unlike <strong>viruses,<\/strong> which typically attach themselves to documents, email attachments and infected websites. Once the host is activated, viruses can destroy files and slow down systems.&nbsp;<\/p>\n\n\n\n<p><strong>Related stories:<\/strong><\/p>\n\n\n\n<ul><li><a href=\"https:\/\/blog.mozilla.org\/privacy-security\/how-to-secure-data-online\/\">How to secure your data in less than 10 minutes<\/a><\/li><li><a href=\"https:\/\/blog.mozilla.org\/internet-culture\/spotting-misinformation-online\/\">How to make sure you aren\u2019t spreading misinformation online<\/a><\/li><\/ul>\n\n\n","protected":false},"excerpt":{"rendered":"<p>If you read news about technology, you&#8217;re bound to run into some jargon. Here at Mozilla, we believe that information should be as accessible as possible regardless of your level of expertise. We want to help you approach stories about technology with more curiosity and with a little less head-scratching involved. We&#8217;ll break down headline-making [&hellip;]<\/p>\n","protected":false},"author":1889,"featured_media":68642,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[461998,289374],"tags":[],"coauthors":[464117],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A glossary of terms about cyberattacks, from ransomware to DDoS<\/title>\n<meta name=\"description\" content=\"Here are some basic words and phrases to know when discussing cyberattacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mozilla.org\/en\/internet-culture\/cyberattacks-glossary-of-terms-ransomware-ddos\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/internet-culture\/cyberattacks-glossary-of-terms-ransomware-ddos\/\",\"url\":\"https:\/\/blog.mozilla.org\/en\/internet-culture\/cyberattacks-glossary-of-terms-ransomware-ddos\/\",\"name\":\"A glossary of terms about cyberattacks, from ransomware to DDoS\",\"isPartOf\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/internet-culture\/cyberattacks-glossary-of-terms-ransomware-ddos\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/internet-culture\/cyberattacks-glossary-of-terms-ransomware-ddos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2022\/04\/moz_cyberattacks_blog_header_1920x1080.png\",\"datePublished\":\"2022-10-19T14:58:00+00:00\",\"dateModified\":\"2022-10-19T20:50:55+00:00\",\"author\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/ff2a2684ab8dcbe5372151857748455d\"},\"description\":\"Here are some basic words and phrases to know when discussing cyberattacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/internet-culture\/cyberattacks-glossary-of-terms-ransomware-ddos\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.mozilla.org\/en\/internet-culture\/cyberattacks-glossary-of-terms-ransomware-ddos\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/internet-culture\/cyberattacks-glossary-of-terms-ransomware-ddos\/#primaryimage\",\"url\":\"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2022\/04\/moz_cyberattacks_blog_header_1920x1080.png\",\"contentUrl\":\"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2022\/04\/moz_cyberattacks_blog_header_1920x1080.png\",\"width\":1920,\"height\":1080,\"caption\":\"An illustrations shows cursors pointing toward a laptop.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/internet-culture\/cyberattacks-glossary-of-terms-ransomware-ddos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.mozilla.org\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A glossary of terms about cyberattacks, from ransomware to DDoS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/#website\",\"url\":\"https:\/\/blog.mozilla.org\/en\/\",\"name\":\"The Mozilla Blog\",\"description\":\"News and Updates about Mozilla\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.mozilla.org\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/ff2a2684ab8dcbe5372151857748455d\",\"name\":\"Kristina Bravo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/image\/cd320165a9224f3c60c912bf4086a89f\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/22fa545a3c48bc13cc1d84d5e09ffbff?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/22fa545a3c48bc13cc1d84d5e09ffbff?s=96&d=mm&r=g\",\"caption\":\"Kristina Bravo\"},\"url\":\"https:\/\/blog.mozilla.org\/en\/author\/kbravo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A glossary of terms about cyberattacks, from ransomware to DDoS","description":"Here are some basic words and phrases to know when discussing cyberattacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mozilla.org\/en\/internet-culture\/cyberattacks-glossary-of-terms-ransomware-ddos\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.mozilla.org\/en\/internet-culture\/cyberattacks-glossary-of-terms-ransomware-ddos\/","url":"https:\/\/blog.mozilla.org\/en\/internet-culture\/cyberattacks-glossary-of-terms-ransomware-ddos\/","name":"A glossary of terms about cyberattacks, from ransomware to DDoS","isPartOf":{"@id":"https:\/\/blog.mozilla.org\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mozilla.org\/en\/internet-culture\/cyberattacks-glossary-of-terms-ransomware-ddos\/#primaryimage"},"image":{"@id":"https:\/\/blog.mozilla.org\/en\/internet-culture\/cyberattacks-glossary-of-terms-ransomware-ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2022\/04\/moz_cyberattacks_blog_header_1920x1080.png","datePublished":"2022-10-19T14:58:00+00:00","dateModified":"2022-10-19T20:50:55+00:00","author":{"@id":"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/ff2a2684ab8dcbe5372151857748455d"},"description":"Here are some basic words and phrases to know when discussing cyberattacks.","breadcrumb":{"@id":"https:\/\/blog.mozilla.org\/en\/internet-culture\/cyberattacks-glossary-of-terms-ransomware-ddos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mozilla.org\/en\/internet-culture\/cyberattacks-glossary-of-terms-ransomware-ddos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mozilla.org\/en\/internet-culture\/cyberattacks-glossary-of-terms-ransomware-ddos\/#primaryimage","url":"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2022\/04\/moz_cyberattacks_blog_header_1920x1080.png","contentUrl":"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2022\/04\/moz_cyberattacks_blog_header_1920x1080.png","width":1920,"height":1080,"caption":"An illustrations shows cursors pointing toward a laptop."},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mozilla.org\/en\/internet-culture\/cyberattacks-glossary-of-terms-ransomware-ddos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.mozilla.org\/en\/"},{"@type":"ListItem","position":2,"name":"A glossary of terms about cyberattacks, from ransomware to DDoS"}]},{"@type":"WebSite","@id":"https:\/\/blog.mozilla.org\/en\/#website","url":"https:\/\/blog.mozilla.org\/en\/","name":"The Mozilla Blog","description":"News and Updates about Mozilla","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mozilla.org\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/ff2a2684ab8dcbe5372151857748455d","name":"Kristina Bravo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/image\/cd320165a9224f3c60c912bf4086a89f","url":"https:\/\/secure.gravatar.com\/avatar\/22fa545a3c48bc13cc1d84d5e09ffbff?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/22fa545a3c48bc13cc1d84d5e09ffbff?s=96&d=mm&r=g","caption":"Kristina Bravo"},"url":"https:\/\/blog.mozilla.org\/en\/author\/kbravo\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/posts\/68641"}],"collection":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/users\/1889"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/comments?post=68641"}],"version-history":[{"count":0,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/posts\/68641\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/media\/68642"}],"wp:attachment":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/media?parent=68641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/categories?post=68641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/tags?post=68641"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/coauthors?post=68641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}