Script (malware)
A type of malware written using a scripting language. Common forms of scripting language include JavaScript, HTML, Visual Basic Script, PowerShell, Perl, Python and Shell Scripting.
Search engine optimization (SEO)
The process of increasing the ranking and popularity of a webpage in search engine results. Usually, the higher a web page is in the list of results, the more likely that someone will visit it.
Security bypass
A software vulnerability that lets an attacker get past a program's security.
Sender ID framework
Technology that helps fight spam, spoofing, and phishing emails. It checks that an email comes from where it says it does. This helps stop deceptive messages.
Settings modifier
A program that changes your computer settings.
Shell
The program that gives your commands to your computer's operating system.
Shellcode
The payload that is run after malware has exploited a software vulnerability.
Signature
A signature is a set of characteristics that we use to identify a piece of malware. Signatures are used by security software to automatically decide if a file is malicious or not.
Social engineering
A method of attack that targets people rather than software. Social engineering is designed to trick you into doing something that benefits the attacker, such as opening or downloading a malware file or giving away your personal information. It can be online, such as an email that tricks you into opening an attachment, or offline, such as a phone call from with someone pretending to be from your bank. However social engineering happens, its purpose is the same – to get you to do something that an attacker wants you to do.
Software bundler
A program that installs potentially unwanted software on your computer at the same time as the software you are trying to install, without adequate consent.
Spam
Bulk unwanted email. Spam can be used to spread malware, either as an email attachment or with a hyperlink that redirects you to an infected webpage. Some malware can collect email addresses for spamming from infected computers, or use infected computers to send spam.
Spam run
A bulk round of spam. A spam run can describe a single round of spam emails sent from the same server, or groups of spam emails on the same theme, for example Valentine's Day spam.
Spammer
A trojan that sends large numbers of spam emails. It may also describe the person or business responsible for sending spam.
Spoof
A type of attack where a message is made to look like it comes from a trusted source. For example, an email that looks like it comes from a legitimate business, but is actually trying to spread malware.
Spoofer
A type of trojan that makes fake emails that look like they are from a legitimate source.
Spoofing
When an attacker mimics someone else. For example, when they create a website that looks the same as a legitimate website to try and trick people into using it.
Spyware
A program that collects your personal information, such as your browsing history, and uses it without adequate consent.
SQL injection
A type of malware attack where SQL code is put into an ordinary web form. If the code is run it can cause significant information loss.
Stack-based buffer overflow
A common type of buffer overflow that allows malware code to run on your computer.
Stealth
A way of hiding a threat, file or process. One form of stealth can be a redirect that makes it hard to look at a malicious file or piece of code because you are sent to a clean location instead.