Cybercrime terms explained

Tradesure tool cover


Used to describe malicious software including Spyware, Ransomware, viruses and worms. Malware breaches a network through a vulnerability, usually when a user clicks a link in an email with then installs the software.

Tradesure tool cover


Blocks access to key areas of the network; usually there is a demand for payment to obtain the key to unlock access.

Tradesure tool cover


Can modify and delete files on a system and can install further malicious software. Worms can also replicate themselves into different systems or servers and disrupt multiple systems.

Tradesure tool cover

Man-in-the-middle attack

Also known as eavesdropping attacks, this is when a hacker inserts themselves into a two-party transaction and removes data which is shared between the two parties. For example, using an instant messenger service to listen in to a conversation in which bank account details are shared or customer data is discussed.

Tradesure tool cover

SQL injection

A Structured Query Language (SQL) injection occurs when an attacker inserts malicious code into a server that uses SQL and forces the server to reveal information it normally would not. An attacker could carry out a SQWL injection simply by submitting malicious code into a vulnerable website search box.

Tradesure tool cover


Covertly obtains information by transmitting data from the hard drive

Tradesure tool cover


Disrupts the system and can render it inoperable

Tradesure tool cover


Sending fraudulent communications that appear to come from a reputable source, usually though an email. The goal is to gain card information, bank login details, a funds transfer from the victim, or to install malicious software into the victim’s computer.
Hackers will often have obtained access to your systems and will monitor internal emails to ensure the phishing email looks legitimate. It will often be written in the same way as a company official would usually write, with similar email signatures. Only when looking closer at the email address can you tell it’s not a legitimate company profile.

Tradesure tool cover

Denial-of-service attacks

This is a flood of network traffic which exhausts the system resources and bandwidth. As a result, the system would be underpowered and unable to handle any legitimate requests, ultimately bringing the business to a standstill.

Tradesure tool cover

Trojan or Trojan horse

A trojan is a program which hides in another useful program. Once the program is run the trojan opens up a back door into the victim’s system and allows the hacker uninterrupted access to the system to perform further attacks or data theft.



To keep everyone safe during this time, our staff are mostly working from home. Our office is not open to visitors during this period; please call us or email to get in touch and we will be happy to help you. Contact us here