All | # A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
There are currently 8 names in this directory beginning with the letter M.
Mail bounce back feed
Mail bounce back are system generated files when emails are not sent due to a wrong email or there is an inbox space issue. [ Type: Analysis]
MITB Man in the browser
A proxy Trojan horse that infects a web browser by taking advantage of vulnerabilities in browser security to modify web pages, modify transaction content or insert additional transactions, all in a completely covert fashion invisible to both the user and host web application. [ Type: Attack ]
MITM Man in the middle
Attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. [ Type: Attack ]
Money Mule
A money mule or sometimes referred to as a "smurfer" is a person who transfers money acquired illegally (e.g., stolen) in person, through a courier service, or electronically, on behalf of others. The mule is paid for their services, typically a small part of the money transferred. Money mules are often dupes recruited on-line for what they think is legitimate employment, not aware that the money they are transferring is the product of crime. The money is transferred from the mule's account to the scam operator, typically in another country. Similar techniques are used to transfer illegal merchandise. [ Type: Terminology]
Monitoring Domain for up/down
Monitoring the availability and performance of web pages of web applications. When not accessible, notifications are sent and corrective actions can be triggered. Website performance monitoring feature checks for various attributes such as response time, etc. [ Type: Analysis ]
Monitoring URL for content
Checks a single URL for its availability, and then continues to search the page for a predefined string of text. If an identical text string isn't identified, an alert is sent to the Monitoring Team. Ideal for sites that demand uptime, contain several critical pages, dynamic content or complex applications/environments. [ Type: Analysis ]
Mtoken App
A software once activated, displays a new eight-digit tokencode once every minute. [ Type: Attack ]
MX record
Mail Exchange Record. [ Type: Data ]