M is for …

MacOS

This is the Operating System used by Apple Macintosh desktop computers, not to be confused with that used by their smartphone and tablet devices which is iOS.

Man in the middle (MITM)

As the name suggests, this is a form of hacking where network traffic or messages are intercepted by someone sitting between the sender and intended recipient.

Typically, the attacker will either take a copy of the traffic so they can see what was being sent, or they will actually change the content of the traffic.

For example, they may change an email which says “I do not want to buy this product” to “I want to buy this product”. It’s therefore quite a dangerous means of attack, particularly as the recipient may not know the messages have been intercepted.

Malware

This is the catch-all term for all types of software which is “bad”, including viruses, worms, trojans and ransomware. Antivirus software is now often labelled Antimalware because it does much more than simply protect against viruses.

Comments

6 responses to “M is for …”

  1. P is for … – Easy Cyber – Security Made Simple Avatar

    […] often contain malware, some of which contains special code to try to compromise a device. This is typically called a […]

    Like

  2. R is for … – Easy Cyber – Security Made Simple Avatar

    […] Remote Access Trojan (RAT) is a piece of malware which enables attackers to gain control of a target machine from a remote location. When attackers […]

    Like

  3. T is for … – Easy Cyber Avatar

    […] its name from the Trojan Horse of ancient Greek tales, a Trojan is a form of malware in which the malicious code is hidden inside what looks like an innocuous application or other […]

    Like

  4. V is for … – Easy Cyber Avatar

    […] computer virus is a form of malware which can carry different payloads. Just like a virus which infects people, a computer virus is […]

    Like

  5. W is for … – Easy Cyber Avatar

    […] worm is a form of malware which replicates iteself in order to infect the computer it is on and any others it can […]

    Like

  6. Bite size Cyber: #1 Patching – Easy Cyber Avatar

    […] in your organisation have the latest patches installed. Don’t forget to include servers, mobile devices, firewalls and other network devices in the list of equipment to be […]

    Like

Leave a comment