Skip to main content
Completion requirements

Definitions and Descriptions.

Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL


Economic Espionage

Economic espionage refers to the theft of trade secrets or other proprietary information for the purpose of providing economic benefit to a rival company or nation. This can involve a variety of activities, including hacking, corporate spying, or other forms of covert information gathering.

Here are some examples of economic espionage:

  1. A company hacks into the computer systems of a rival company in order to steal sensitive business information, such as financial records or trade secrets.

  2. A corporate insider provides proprietary information to a rival company in exchange for financial compensation.

  3. A foreign government engages in cyber espionage to gather information about the economic plans and strategies of a rival nation.

  4. A company hires a private investigator to covertly gather information about a rival company's business practices.

Overall, economic espionage can have significant negative impacts on the victim company, including financial loss, damage to reputation, and loss of competitive advantage. It is often considered a form of industrial espionage, and can be prosecuted as a crime in many countries

Evil Twin

A wireless evil twin attack is a type of cyberattack in which an attacker creates a fake wireless access point (WAP) that is designed to mimic a legitimate WAP in order to steal sensitive information from unsuspecting users. The fake WAP, also known as the "evil twin", is set up to look like a legitimate WAP, such as a public WiFi hotspot or a corporate network. When a user connects to the evil twin, the attacker can intercept and steal the user's sensitive information, such as login credentials and financial information.

There are several ways that an attacker can carry out a wireless evil twin attack:

  1. Spoofing the SSID (Service Set Identifier): The SSID is the name of a WAP that is broadcast to devices in order to identify the network. An attacker can create an evil twin WAP with the same SSID as a legitimate WAP in order to trick users into connecting to it.

  2. Using a stronger signal: An attacker can use a stronger signal than the legitimate WAP in order to make the evil twin more attractive to users. This can be particularly effective in crowded areas, where there may be multiple WAPs with overlapping coverage.

  3. Using a man-in-the-middle attack: An attacker can use a man-in-the-middle attack to intercept and alter the communication between a user and a legitimate WAP. The attacker can then redirect the user to the evil twin WAP, where they can steal the user's sensitive information.

Wireless evil twin attacks can be difficult to detect, as the fake WAP is designed to mimic a legitimate WAP. Users can protect themselves from these attacks by being cautious when connecting to unfamiliar WiFi networks, checking the spelling and capitalization of the SSID, and using a VPN to encrypt their internet traffic.

Overall, wireless evil twin attacks are a serious threat to users' privacy and security, and it is important for individuals to be aware of this type of attack and take steps to protect themselves.


EXIF (Exchangeable Image File Format) data is metadata that is embedded in a photo file. It contains information about the device that captured the photo, such as the make and model of the camera or smartphone, and settings used by the device at the time the photo was taken, such as the aperture, shutter speed, and ISO. EXIF data also includes the date and time the photo was taken, and sometimes the location where the photo was taken if the device's GPS was turned on.

Here are some examples of the types of information that might be included in EXIF data:

  • Date and time the photo was taken
  • Camera make and model
  • Aperture setting
  • Shutter speed
  • ISO speed
  • Focal length of the lens
  • Flash setting
  • White balance setting
  • GPS coordinates (if the device's GPS was turned on)

You can view the EXIF data of a photo by opening the photo in a photo editing software or using a free online EXIF viewer. Some social media platforms, like Facebook and Instagram, also allow you to view the EXIF data of a photo by clicking on the photo and selecting the "Info" or "Details" option.

loader image