Cybersecurity Glossary

All | # A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
V
Vaccine
A computer program used to discover and disable computer viruses. Vaccines are written to combat after a virus attack. After analysing the code that makes up a computer virus, the virus signature can normally be identified. Identifying the signature is the first step in creating a vaccine to combat it.
Vawtrak/Neverquest
Vawtrak which is also known as neverquest, is malware used to gain unauthorized banking access. The malware infects machines then joins them into a botnet that is used to collect online banking credentials. The malware is used to login to unsuspecting victims bank accounts, and transfer money into the accounts of the hackers (the botnet administrators). One way this malware works is it injects DLL into a web browser, so that once the targeted websites are visited, extra code can be injected into the webpage allowing the hacker to bypass authentication methods.
Virtual Private Network/VPN
Making use of the internet to create a private network that is secured by making use of encryption and tunnel technologies to ensure only authorized users access the private network. Many companies use VPNs to allow their employees to access the company intranet while being on an external site. For example, an employee can log into their company’s VPN from their home computer by accessing a specific URL, and supplying some form of authentication then the service creates an encrypted tunnel into the company’s network.
Virus
A malicious program that is installed onto a computer system normally without the user’s knowledge. It replicates itself by copying over to a program or boot sector. A virus can be used to cause harm and destruction to a computer, it’s files, applications or it can be used to steal personal data or create a backdoor into a system giving an unauthorized user access to the system. Viruses, worms, Trojans, spyware, ransomware, and malware are often used interchangeably, though there are differences. Many of these are considered types of viruses as they all are used for malicious purposes.
Virus Hoax
A misleading, false message, warning about a computer virus that does not actually exist on the computer. The warning normally comes in an email message. These messages can create a mindset to ignore legitimate virus warnings causing a potential vulnerability if users do not remain diligent. Some virus hoaxes have actually been used to send viruses. There was an AOL4FREE virus hoax warning, that later was used to distribute a Trojan.
Vishing
An attempt to scam a would be victim by using the telephone to make fraudulent phone calls pretending to be from a reputable company. The point of vishing is to gain financial or other personal information.
Vulnerability
An exploitable weakness within a computer system, or application. A flaw that could allow unauthorized access or compromise.