- Encryption is the process of converting data into a form that cannot easily be read without knowledge of the conversion mechanism (often called a key).The European Union’s (EU) proposed ePrivacy Regulation aims to secure and ensure privacy in electronic communications. It is intended as an update to the ePrivacy Directive to include modern communications technologies.The GDPR is a new regulation created by the European Union. It has been four years in the making and was finally approved on April 14, 2016. It will replace its predecessor, the Data Protection Directive 95/46/EC, which was adopted in 1995.This is the known extension for executable files, which launch custom actions as dictated by its purpose. As .EXE files can launch a variety of actions, these are often used to launch malware on computers.Executable and Link Format (ELF) is an executable file format for the Linux and Unix platforms. Trend Micro detects malicious executable code for Linux and UNIX as ELF_malwarename.An exploit is code that takes advantage of a software vulnerability or security flaw. Exploits are often incorporated into malware, which are consequently able to propagate into and run intricate routines on vulnerable computers.Exploit kits are toolkits used to exploit security holes primarily to spread malware. These toolkits come packaged with exploit codes. Computers using outdated software/applications are at high risk.