Glossary, explanation of technical terms


  • Malware
    General term for malicious software

  • Data breach
    refers to a data breach/data theft and is a security incident in which unauthorized third parties gain access to confidential, sensitive, or personal data. This occurs through cyberattacks (hacking), accidental disclosure, or theft of data storage devices. Consequences often include identity theft, financial losses, and reputational damage. Data breaches involving personal data, as defined in Article 33 of the GDPR, must be reported to the Austrian Data Protection Authority https://dsb.gv.at/ .

  • Adware
    programs that display unwanted advertisements. Popup blockers help against this; they are usually already integrated into the browser but need to be activated.

  • Phishing
    is a cyber fraud method in which criminals attempt to obtain personal data such as passwords, credit card numbers, or bank details through fake emails, text messages (smishing), or websites. They impersonate trusted institutions, friends, or companies to manipulate victims into entering their data. The goal is usually identity theft or financial loss.

  • Spear phishing
    is a highly targeted cyberattack in which attackers use personalized emails or messages to trick specific individuals or companies into revealing sensitive data. Unlike mass phishing, attackers use pre-researched information (social engineering), which makes the attacks extremely convincing.


  • Virus/malicious
    code that embeds itself in or attaches to files and, when executed (usually requiring user action), spreads independently.

  • Worms
    are independent malicious programs that spread autonomously across networks.

  • Trojans (Trojan horses)
    disguise themselves as useful applications, but secretly perform harmful functions.

  • Session tokens, session IDs, or session cookies
    are used in applications that constantly monitor data traffic to ensure it is authorized. To avoid requiring users to authenticate repeatedly, a session token is generated after the initial authentication. This token serves to identify the network communication. However, if someone manages to steal this session token, they can enter the network communication on behalf of the compromised user. Therefore, logging out of sessions that are no longer needed is a crucial security measure.

  • Technical support fraud
    Manipulated websites (phishing websites) or infected advertising banners offer downloads containing malicious code. Often, simply visiting the website and viewing images without clicking is enough to display a fake warning that the computer is infected, including a phone number. See the section on phishing websites and widgets for more information.

  • Ransomware (extortion Trojan)
    encrypts data or locks system access, and the hackers demand a ransom, usually in Bitcoin, or sell the data on the dark web. Unscrupulous hackers demand ransom and sell the data.

  • Spyware
    spies on data, user behavior, or passwords.

  • Keylogger
    A type of spyware that records keystrokes.

  • Bot (or robot for short)
    is a computer program that performs automated tasks independently and repetitively on the internet. In principle, this is not a bad thing; it is often used to imitate human behavior, for example, on social media. They act much faster than humans and can be either useful or malicious.

  • Botnet
    A network of remotely controlled, infected computers (bots, zombies) used for various attacks (DDoS, spam). This can result in your email address or IP address being blacklisted.

  • Blacklists
    exist for email systems, IP addresses, entire network segments, and websites. Once on a blacklist, you usually have to prove you've taken action to get delisted.

  • Rootkit / bootkit
    software that hides deep within the system (e.g., BIOS, boot loader, kernel) to gain administrator privileges, cover its tracks, and permanently embed itself undetected in the operating system. Therefore, it is crucial that Secure Boot is enabled and up-to-date on your system. LinkBootkit and rootkit differ in their point of attack. While rootkits target the kernel level within the operating system, bootkits operate at the Master Boot Record (MBR) or within the UEFI Boot Manager partition.

  • Scareware
    deceives users with fake warning messages to trick them into buying useless software.

  • Roguware
    is fake software or fake security software; it pretends to be, for example, an antivirus program, but is actually spying on your computer. (e.g., Super Antivirus) It often hides as a free app in app stores.

  • Backdoor
    allows attackers unauthorized remote access to the system. Some manufacturers are suspected of having built in backdoors for themselves and intelligence agencies.

  • Exploit
    is a small program/tool that takes advantage of unpatched security vulnerabilities to install malware, or a technical guide that shows how to exploit these vulnerabilities. This is why updates are so important to close security gaps, as known vulnerabilities are especially dangerous. Exploit kits are software toolkits that allow beginners to quickly build malware.

  • Man-in-the-middle attack (MitM attack)
    is a cyber threat in which an attacker secretly positions themselves between two communicating parties—for example, a user and a website—to intercept, eavesdrop on, or modify data in real time. Attackers steal login credentials, financial data, or session tokens, often using public Wi-Fi networks or fake, malicious websites.

  • Adversary-in-the-Middle (AiTM) attack
    An AiTM attack is a sophisticated cyberattack technique based on HTTP reverse proxy, in which the attacker inserts themselves undetected between two communicating parties – usually between a user and a legitimate website or application (such as Microsoft 365, banking portals, etc.).
    Link

  • DDoS attack (Distributed Denial-of-Service)
    is a cyberattack that aims to render online services unusable by overloading them with massive amounts of data traffic. A target server is attacked simultaneously by thousands of infected computers (in botnets). The consequences include slowed-down websites, outages, financial losses, and reputational damage.

  • Proxy server
    is an intermediary/representative in computer networks that acts between a client (e.g., your browser) and the internet. It forwards requests, thereby hiding the original IP address, increasing security (firewall functions), saving bandwidth through caching, or bypassing geoblocking – nothing inherently malicious.

  • Reverse proxy
    is an intermediary server positioned in front of the backend web servers. It acts as their "public interface" and manages incoming client requests. It improves web performance through caching and load balancing, enhances security by masking server IP addresses, and simplifies SSL encryption. This makes it an important tool for scaling and traffic control. As with any proxy, this is generally a good thing, but it can be misused for highly sophisticated AITM attacks. Link


  • Social engineering (attack)
    Deceives users with fake warning messages to trick them into buying useless software.

  • Supply Chain Attack
    A supply chain attack occurs when cybercriminals infiltrate a company by exploiting vulnerabilities in trusted third-party vendors, suppliers, or software dependencies. Instead of directly attacking a well-protected target, attackers compromise a less secure partner to gain unauthorized access, steal data, or silently install malware (e.g., via GitHub) into a product. This often results in widespread damage that goes undetected for extended periods. These attacks are frequently carried out using social engineering and can last for years. Some countries are suspected of conducting supply chain attacks.

  • Fileless malware
    attacks do not use files, but only network packets. This type of malware cannot be detected by traditional file-based antivirus software.

  • SQL injection
    (SQLi) is a security vulnerability in web applications that allows attackers to intercept an application's database queries. This enables attackers to view data they would not normally have access to. One form of SQL injection is through insecure input fields in web forms.

  • Cryptojacking
    With the increasing popularity of cryptocurrencies, mining coins has become a lucrative practice. Cryptojacking means that a device's computing power is stolen using a Trojan/bot to mine cryptocurrencies without the owner's knowledge, significantly slowing down the infected system.

  • Servers
    provide services such as file and print services, databases, remote access (terminal servers), web servers, and much more. Servers are therefore popular targets for attacks.

  • Backend
    On servers running in the backend, the user accesses services but has no direct, visible user interface. To cause as much damage as possible, criminals aim to infiltrate backend systems.


Positively connoted terms


  • Ethnic hacking
    refers to certified hacking by "good" hackers who advise and hack on security issues on behalf of companies and government agencies to find security vulnerabilities. However, even "good" hacking is illegal without prior notification of the target company.

  • Security awareness
    in the form of training courses, workshops, and phishing simulations for email reception to educate and train employees. Link

  • Penetration tests
    are used to find security vulnerabilities through real cyber attacks and pen-test tools on infrastructures such as firewalls, web servers, and company servers by deliberately attacking and stressing the infrastructure.

The dangers on the internet are significant and threaten us all around the clock.
Conscious use and technical safeguards are essential. Use our Cyber Security Checklist!

to the checklist