Glossary

Blacklist: In web security, a blacklist consists of a list of websites or IP addresses (see IP address) that are deemed dangerous or serve content that is illegal.

CMS: CMS stands for Content Management System and is used on most websites to publish and maintain content. Popular CMS software includes WordPress, Joomla, Drupal. CMS could be websites’ Achilles’ heel as they are constantly being exploited for vulnerabilities by hackers. For this reason, it is important to keep them up-to-date.

Drive-by-download: This is a type of malicious attack that happens when you visit any website that has been infected. It downloads malicious code on your computer without your approval or knowledge.

Firewall: A firewall is a barrier of protection for a computer or website. It can be a physical (router) or software firewall. It aims at keeping potential intruders away as well as logging all activity taking place.

IP address: An IP address is a series of digits used by computers to find online servers. Technically, each website can be translated into an IP address but since humans do not read like machines, it is more user friendly to type in google.com for example, than 173.194.33.35.

JavaScript: JavaScript is a computer language used by many programmers to perform interactions between a website and the user’s computer. Bad guys encore malicious code – sometimes obfuscated (see Obfuscation) – using JavaScript within a website to infect PCs.

Java: Java (different than JavaScript) is a computer language that makes it possible to run rich applications. In recent years Java has been heavily targeted by hackers to launch malicious attacks. For this reason, if you do not require Java, it is recommended to remove it.

Malware: Malware is malicious software that can be distributed by email, file sharing, but mostly from compromised websites.

Obfuscation: Obfuscation is a technique used mostly by criminals to hide malicious code. By hiding it, they are making it difficult to detect by traditional security software, therefore guarantying a higher infection rate.

OS: Short for Operating System. Each computer uses an Operating System to function. The most popular are Microsoft’s Windows, Android, iOS, and Linux (Ubuntu, Red Hat, etc..)

PHP: PHP is a scripting language that is used by millions of websites. Keeping an up-to-date version ensures your website is not at risk from code injection.

Scan: A scan is an inspection of a computer or website using one or more security engines.

Site Availability: This feature tests if your website is responding when asks for a particular request. More simply, it makes sure it is up and running normally so visitors can see the page in their web browser (see Web Browser).

SSL: SSL is a protocol that provides an additional layer of security for online communications. However, it is not a sign that a website can be blindly trusted if they have a SSL Certificate. Make sure your SSL certificate hasn’t expired and links to a trusted organization.

Ticket: A ticket is a potential issue (see Vulnerability) that our scanner identified. Tickets are sorted by severity level, from Low to Medium to High. Each ticket includes a description of the problem, its impact and remediation tips.

Vulnerability: In computer security, a vulnerability is a flaw that exists in a piece of software which allows for unintended use of the program to perform some potentially harmful action.

Web browser: A web browser is a piece of software that lets you surf and view pages on the Internet. Popular browsers include: Internet Explorer, Firefox, Chrome, Safari, etc..