Sub Total
Excluding delivery and voucher code discounts.
Go to basket

Free Delivery on all orders to UK mainland within 3 working days.

HP Tech@Work
Today's trends for tomorrow's business
Level Up Your Hacker Lingo

Level Up Your Hacker Lingo

Test your knowledge here

You already know what phishing and spyware are, but how about spearfishing? Shodan? Zombies? Here’s a glossary of some hacker lingo that you and your IT team should be aware of.

Brute Force Attack

When a hacker tries to guess your system’s password by guessing all the passwords with an intensive automated search. One of the biggest reasons the US and China are investing in quantum computing research is because quantum machines can, in theory, defend against this kind of barrage.

Doxxing

Exposing a person’s sensitive personal information on the internet. It can be anything from addresses and phone numbers to credit card and social security numbers. An example of doxxing specific to the business world is Whaling.

Evil Maid Attack

When a hacker goes in and hacks your device in person. This person has access to your space - the kind of access that a maid tidying your office might have.

Grey Hat

Black hats are hackers who are up to no good; White hats are cybersecurity experts who spend their time helping organizations defend themselves. (To make things more confusing, some white hats are good at their jobs because they used to be black hats.) Meanwhile, grey hats employ black hat techniques, but they don’t do it for profit or nefarious reasons; they’re hacking because they’re on a mission (that can be good or bad). If you are a grey hat, sometimes you are also a...

Hacktivist

People who hack to make a political or social statement. Prominent groups like Anonymous and WikiLeaks think of themselves as hacktivists.

R.U.D.Y attack

Short for “R U Dead Yet,” this is a slow-rate (also known as a “low and slow”) attack designed to exhaust a web server by submitting long-form fields until it crashes.

Sniffing

Capturing unencrypted data as it transmits over a network. Sniffers can be used to diagnose network issues - or steal sensitive information.

Spearphishing

A phishing scheme that targets a certain group within an organization. (Also see Whaling.)

Shodan

Shodan refers to Shodan.io, a site that scans entry-level devices connected to the internet (such as many IoT devices) and looks for vulnerabilities. Ostensibly it’s used to help you secure devices, but hackers will look for vulnerabilities to exploit them. (In Japanese, “shodan” refers to an entry-level martial arts belt.)

Whaling

A phishing scheme that takes aim at the very top of the C-suite food chain. Hackers collect executives’ personal information (and threaten to doxx them) or compromising information (such as their salaries) to blackmail them into paying a ransom or some other demand.

Worm

A type of malware that replicates itself automatically, spreading across the network.

Zero-day exploit

Also known as a zero-day attack. This is when a hacker finds a weak point in a system and releases malware before developers can release a patch. “Day zero” is jargon for the day the target learns of the vulnerability; in a zero-day exploit, the target has “zero days” to do anything about it.
The best way to handle a hack is to keep it from happening. We can help. Browse HP®’s security options and find the solutions your business needs.

Disclosure: Our site may get a share of revenue from the sale of the products featured on this page.

More about these products
Disclaimer

Prices, specifications, availability and terms of offers may change without notice. Price protection, price matching or price guarantees do not apply to Intra-day, Daily Deals or limited-time promotions. Quantity limits may apply to orders, including orders for discounted and promotional items. Despite our best efforts, a small number of items may contain pricing, typography, or photography errors. Correct prices and promotions are validated at the time your order is placed. These terms apply only to products sold by HP.com; reseller offers may vary. Items sold by HP.com are not for immediate resale. Orders that do not comply with HP.com terms, conditions, and limitations may be cancelled. Contract and volume customers not eligible.

HP’s MSRP is subject to discount. HP’s MSRP price is shown as either a stand-alone price or as a strike-through price with a discounted or promotional price also listed. Discounted or promotional pricing is indicated by the presence of an additional higher MSRP strike-through price

The following applies to HP systems with Intel 6th Gen and other future-generation processors on systems shipping with Windows 7, Windows 8, Windows 8.1 or Windows 10 Pro systems downgraded to Windows 7 Professional, Windows 8 Pro, or Windows 8.1: This version of Windows running with the processor or chipsets used in this system has limited support from Microsoft. For more information about Microsoft’s support, please see Microsoft’s Support Lifecycle FAQ at https://support.microsoft.com/lifecycle

Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.

In-home warranty is available only on select customizable HP desktop PCs. Need for in-home service is determined by HP support representative. Customer may be required to run system self-test programs or correct reported faults by following advice given over phone. On-site services provided only if issue can't be corrected remotely. Service not available holidays and weekends.

HP will transfer your name and address information, IP address, products ordered and associated costs and other personal information related to processing your application to Bill Me Later®. Bill Me Later will use that data under its privacy policy.

Microsoft Windows 10: Not all features are available in all editions or versions of Windows 10. Systems may require upgraded and/or separately purchased hardware, drivers, software or BIOS update to take full advantage of Windows 10 functionality. Windows 10 is automatically updated, which is always enabled. ISP fees may apply and additional requirements may apply over time for updates. See http://www.microsoft.com.

“Best All In One Printer” and “the easiest printer you’ve ever had to set up” from Wirecutter. ©2020 The Wirecutter, Inc.. All rights reserved. Used under license. https://www.nytimes.com/wirecutter/reviews/best-all-in-one-printer/

Get Marvel’s Avengers when you purchase HP gaming PCs with qualifying 9th gen or 10th gen Intel® Core™ i5, i7 and i9 processors. Redemption code will be sent out by email within 60 days of purchase. Limited quantities and while supply lasts. Offer valid thru 12/31/2020 only while supplies last. We reserve the right to replace titles in the offer for ones of equal or greater value. Certain titles may not be available to all consumers because of age restrictions. The Offer may be changed, cancelled, or suspended at any time, for any reason, without notice, at Intel’s reasonable discretion if its fairness or integrity affected whether due to human or technical error. The Offer sponsor is Intel Corporation, 2200 Mission College Blvd., Santa Clara, CA 95054, USA. To participate you must create an Intel Digital Hub Account, purchase a qualifying product during the redemption period, enter a valid Master Key, and respond to a brief survey. Information you submit is collected, stored, processed, and used on servers in the USA. For more information on offer details, eligibility, restrictions, and our privacy policy, visit https://softwareoffer.intel.com/offer/20Q3-19/terms.

© 2020 MARVEL. © Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. Other names and brands may be claimed as the property of others.

The personal information you provide will be used according to the HP Privacy Statement (https://www8.hp.com/us/en/privacy/ww-privacy.html)