Threat glossary

Introduction In the world of E-mail, attacks are not new– they are not old. They are ever-present, sometimes we are aware of it, sometimes not. But they are always around. It is not too often that we have email linked attacks but once they occur it usually raises hell all around. And the Internet is abuzz with various compromises, threats and what not. The recent log4j compromise is one such in which people did not know a vulnerability existed till talk was out.

Continue reading

Trojan

Introduction In the world of E-mail, attacks are not new– they are not old. They are ever-present, sometimes we are aware of it, sometimes not. But they are always around. It is not too often that we have email linked attacks but once they occur it usually raises hell all around. And the Internet is abuzz with various compromises, threats and what not. The recent log4j compromise is one such in which people did not know a vulnerability existed till talk was out.

Continue reading

Worms

Introduction In the world of E-mail, attacks are not new– they are not old. They are ever-present, sometimes we are aware of it, sometimes not. But they are always around. It is not too often that we have email linked attacks but once they occur it usually raises hell all around. And the Internet is abuzz with various compromises, threats and what not. The recent log4j compromise is one such in which people did not know a vulnerability existed till talk was out.

Continue reading

Malware

Introduction In the world of E-mail, attacks are not new– they are not old. They are ever-present, sometimes we are aware of it, sometimes not. But they are always around. It is not too often that we have email linked attacks but once they occur it usually raises hell all around. And the Internet is abuzz with various compromises, threats and what not. The recent log4j compromise is one such in which people did not know a vulnerability existed till talk was out.

Continue reading

Phishing

Introduction Also patching systems infected with the new vulnerability or bug or exploit or buffer overflow or whatever is usually slow and typically takes days and suddenly attackers world over are now able to ride on top of the vulnerability. Danger of zero day attacks The main problem associated with zero day attacks is the depth and breadth of damage it can cause you, since nothing is known about this family or class or category of malware.

Continue reading

Ransomware

Introduction In the world of E-mail, attacks are not new– they are not old. They are ever-present, sometimes we are aware of it, sometimes not. But they are always around. It is not too often that we have email linked attacks but once they occur it usually raises hell all around. And the Internet is abuzz with various compromises, threats and what not. The recent log4j compromise is one such in which people did not know a vulnerability existed till talk was out.

Continue reading

What are exploits?

Introduction In the world of E-mail, attacks are not new– they are not old. They are ever-present, sometimes we are aware of it, sometimes not. But they are always around. It is not too often that we have email linked attacks but once they occur it usually raises hell all around. And the Internet is abuzz with various compromises, threats and what not. The recent log4j compromise is one such in which people did not know a vulnerability existed till talk was out.

Continue reading