• Website defacement is similar to drawing graffiti on a wall, only it happens virtually. Websites’ appearance change - pictures and/or words are scrawled across the defaced website.
  • Website spoofing is the creation of a replica of a trusted site with the intention of misleading visitors to a phishing site. Legitimate logos, fonts, colors and functionality are used to make the spoofed site look realistic.
  • Whale phishing is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Because of their status, if such a user becomes the victim of a phishing attack he can be considered a “big phish,”
  • Whitespace padding refers to a technique wherein cybercriminals insert spaces before a filename extension to disguise the real extension of the file. Malware or grayware authors do this so that, in a fixed-width column, the extension is no longer see
  • A whitelist is a list of accepted items in a set. This list is inclusionary, confirming that the item being analyzed is acceptable. It is the opposite of a blacklist which confirms that items are not acceptable.
  • A computer worm is a self-contained program (or set of programs) that is able to spread functional copies of itself or its segments to other computer systems. The propagation usually takes place via network connections or email attachments.