Tags: Hacker, Hacking
A hacker is a person skilled in information technology who achieves goals by non-standard means. The term has become associated with popular culture with a security hacker - someone with knowledge of bugs or exploits to break into computer systems and accesses data which would otherwise be inaccessible to them.

Tags: Malware, Zombie
In computing, a zombie is a computer connected to the internet that has been compromised by a hacker via a computer virus, computer worm, or trojan horse program and can be used to perform malicious tasks under the remote direction of the hacker.

Tags: Ethical Hacking, White Hat Computer Security
A White Hat (or white-hat hacker) is an ethical security hacker. Ethical Hacking is a term meant to imply a broader category than just penetration testing. Under the owner's consent, white-hat hackers aim to identify any vulnerabilities or security issues the current system has.

Tags: Grey Hat, Hacker
A Grey Hat is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker.

Tags: Cyber Security, Malware, Hack, Hacker, USBKill
USBKill is anti-forensic software distributed via GitHub. It is written in Python and is compatible with the BSD, Linux, and OS X operating systems. It is designed to serve as a kill switch if the computer on which it is installed should fall under the control of individuals or entities against the desires of the owner.

Tags: Hacking, Hacker, Anonymous, Black Hat Hackers
Anonymous is a decentralized international activist and hacktivist collective and movement primarily known for its various cyberattacks against several governments, government institutions and government agencies, corporations, and the Church of Scientology.

Tags: Black Hat Hacker, Hacking
A black hat (black hat hacker or blackhat) is a computer hacker who violates law or ethical standards for nefarious purposes, such as cybercrime, cyberwarfare, or malice. These acts can range from piracy to identity theft.
