by Alexander | 8 October 2024
A botnet is a network of devices (computers, phones, etc.) infected with malicious software that can be remotely controlled by cybercriminals to carry out malicious tasks, such as sending spam or launching Denial of Service (DDoS) attacks.
by Alexander | 6 February 2025
Business Email Compromise (BEC) is the hacking of business email accounts to embezzle funds, falsify communications or mislead the public. It is a form of...
by Alexander | 24 October 2024
A CERT (Computer Emergency Response Team) is a specialised cybersecurity team dedicated to managing large-scale IT security incidents. In French, the term CERT or CSIRT (Computer Security Incident Response Team) is sometimes used.
by Alexander | 20 October 2024
A Trojan horse is a type of malicious software that downloads itself onto a computer, disguised as a legitimate program, to trick the user and infiltrate their system.
TYPE : 🔴 Computer attack
FREQUENCY: 💣💣💣💣
DANGEROUS: 💀💀💀💀💀
Unlike computer viruses, which replicate themselves automatically, Trojan horses require action on the part of the user to install themselves.
by Alexander | 14 February 2025
Encryption, also known as cryptography in everyday language although this term is inappropriate, is a technique which consists of transforming understandable data, known as plaintext data, into an unreadable and incomprehensible format, known as encrypted data, using mathematical algorithms and one or more encryption keys.
This transformation ensures that only people with the decryption key (or the corresponding keys in the case of two-key systems) can read and understand the original content.
The aim is to protect the confidentiality, integrity and sometimes authenticity of information, by preventing it from being consulted or modified by unauthorised persons.
The aim is to protect the confidentiality, integrity and sometimes authenticity of information, by preventing it from being consulted or modified by unauthorised persons.