• Backdoor programs are applications that open computers to access by remote systems. These programs typically respond to specially-built client programs but can be designed to respond to legitimate messaging applications.
  • A blacklist is a list of items in a set that are not accepted. This list is exclusionary, confirming that the item being analyzed is not acceptable. It is the opposite of a whitelist which confirms that items are acceptable.
  • Blended threats are bundles of malicious programs that combine the functionality of different types of malware, including Trojans, worms, and backdoors. A blended threat often involves an infection chain which begins with a user visiting a website an
  • Blended threats are bundles of malicious programs that combine the functionality of different types of malware, including Trojans, worms and backdoors.
  • Boot sector viruses infect the boot sector or the partition table of a disk. Systems are typically infected by these viruses when started with infected floppy disks.
  • A bot is a remotely controlled Trojan which infects Internet-connected PCs and is remotely controlled by an attacker typically via private IRC channels.
  • A botnet [short for bot network] is a network of hijacked zombie computers that are remotely controlled by a hacker. The hacker uses the network to send spam and launch Distributed Denial of Service [DDoS] attacks, and may rent the network out to other cyberc
  • Browser Helper Objects (BHOs) are companion applications for Microsoft Internet Explorer. They usually come in the form of toolbars, search helpers, and monitoring applications.
  • Attacks classified as BPC or ‘business process compromise’ silently alter a part of specific business processes in order to generate significant monetary profit for the attackers.