CVSS
Common Vulnerability Scoring System (acronym).
The practice of a government’s hiring of a contractor, often but not always a criminal group, to conduct cyberespionage on its behalf. The cyber privateer receives a list of intelligence...
A crowd-sourced cyber attack, sometimes inspired by but seldom closely controlled by a state security agency.
A cyber attack without any obvious rational criminal, political, or ideological motive, usually defacement of a vulnerable website to display the hacker’s prowess.
A hack directed against a cyber criminal site or organization. While extralegal (and often illegal) cyber vigilantism is conducted to impede or punish cyber crime, and not necessarily crimes of...
The difference between organizational employee job requirements and the skillsets available in the labor market.
An operating system program running in the background designed to perform a specific task when certain conditions or events occur.
<!-- wp:list {"ordered":true} --> <ol><!-- wp:list-item --> <li>https://www.wired.com/story/how-to-spot-avoid-dark-patterns/</li> <!-- /wp:list-item --></ol> <!-- /wp:list -->