This is the Operating System used by Apple Macintosh desktop computers, not to be confused with that used by their smartphone and tablet devices which is iOS.
Man in the middle (MITM)
As the name suggests, this is a form of hacking where network traffic or messages are intercepted by someone sitting between the sender and intended recipient.
Typically, the attacker will either take a copy of the traffic so they can see what was being sent, or they will actually change the content of the traffic.
For example, they may change an email which says “I do not want to buy this product” to “I want to buy this product”. It’s therefore quite a dangerous means of attack, particularly as the recipient may not know the messages have been intercepted.
This is the catch-all term for all types of software which is “bad”, including viruses, worms, trojans and ransomware. Antivirus software is now often labelled Antimalware because it does much more than simply protect against viruses.
6 thoughts on “M is for …”
[…] often contain malware, some of which contains special code to try to compromise a device. This is typically called a […]
[…] Remote Access Trojan (RAT) is a piece of malware which enables attackers to gain control of a target machine from a remote location. When attackers […]
[…] its name from the Trojan Horse of ancient Greek tales, a Trojan is a form of malware in which the malicious code is hidden inside what looks like an innocuous application or other […]
[…] computer virus is a form of malware which can carry different payloads. Just like a virus which infects people, a computer virus is […]
[…] worm is a form of malware which replicates iteself in order to infect the computer it is on and any others it can […]
[…] in your organisation have the latest patches installed. Don’t forget to include servers, mobile devices, firewalls and other network devices in the list of equipment to be […]