Close Panel



Selling or Installing copies of unlicensed commercial software or other copyright protected materials (Warez).

DoS, DDoS, Sabotage

By this kind of an attack a system is bombarded with so many packets that the operations are delayed or the system crashes. Examples of a remote DoS are SYS-a. PING-flooding or E-mail bombing (DDoS: TFN, Trinity, etc.) However, the availability also can be affected by local actions (destruction, disruption of power supply, etc.).

Exploiting of known vulnerabilities

An attempt to compromise a system or to disrupt any service by exploiting vulnerabilities with a standardised identifier such as CVE name (e.g. buffer overflow, backdoors, cross side scripting, etc.)


Discreditation or discrimination of somebody (i.e. Cyber stalking)

Login Attempts

Multiple login attempts (Guessing/ cracking of passwords, brute force)


Type of attacks in which one entity illegitimately assumes the identity of another in order to benefit from it.

New attack signature

An attempt using an unknown exploit.

Privileged Account Compromise, Unprivileged Account Compromise, Application Compromise

A successful compromise of a system or application (service). This can have been caused remote by a known or new vulnerability, but also by an unauthorized local access.


Attacks that send requests to a system to discover weak points. This includes also some kind of testing processes to gather information about hosts, services and accounts. Examples: fingerd, DNS querying, ICMP, SMTP(EXPN, RCPT,…)


Observing and recording of network traffic (wiretapping)

Social Enginerring

Gathering information from a human being in a non-technical way (e.g. lies, tricks, bribes or threats )


Spam or “Unsolicited Bulk Email”, this means that the recipient has not granted verifiable permission for the message to be sent and that the message is sent as part of a larger collection of messages, all having an identical content.

Unauthorised access to information, unauthorised modification of information

Besides a local abuse of data and systems the information security can be endangered by a successful account or application compromise. Furthermore attacks are possible that the intercepts and access information during transmission (wiretapping, spoofing or hijacking).

Unauthorized use of resources

Using resources for unauthorised purposes including profit-making ventures (E.g. the use of email to participate in illegal profit chain letters or pyramid schemes).

Viruses, Worms, Trojan, Spyware, Dialer

Software that is intentionally included or inserted in a system for a harmful purpose. A user interaction is normally necessary to activate the code.

Hit Counter provided by Skylight