Keylogger
A program used to record keystrokes typed on a computer. Keyloggers can be used for both beneficial purposes, such as monitoring employees in a regulated industry, or malignant ones, such as to steal account credentials. read more ...
Malware
A portmanteau word combining MALicious and softWARE, malware is used as an umbrella term to cover all forms of malicious code, read more ...
Master Boot Record
Located in the very first sector at the beginning of a hard disk, the Master Boot Record (MBR) is a combination of a program code and data used by that program (the so-called partition table read more ...
Memory Dump
A copy of the system memory at the time of a system crash (blue screen of death), mostly used for application troubleshooting and debugging read more ...
Overwriting viruses
Overwriting viruses are the simplest forms of infection. The original code is deleted and replaced by new, malicious code. When the substituted file is executed the virus can try to replicate again. read more ...
Packer, Crypter, Protector
Packers are the “outer shells” of some trojan horses, the purpose of which is to make detection and analysis by anti-virus software and malware analysts (respectively) more difficult by hiding the payload they contain, making it first necessary to unpack them so as to ascertain their purpose. read more ...
Phishing
A play on the word "fishing" deceptive email, texts or other messages sent to a target in order to steal their account credentials. read more ...
Polymorphism
Polymorphism is the term used to describe a program that changes the order in which its instructions are stored on disk, executed in memory, etc. read more ...
PUA
Grayware (or PUA - a Potentially Unwanted Application) is a broad category of software, whose intent is not as unequivocally malicious as with other types of malware, such as viruses or trojan horses. read more ...
Quarantine
The main task of the anti-virus quarantine is to safely store infected files in order to prevent their being accidentally run and performing malicious actions. read more ...
Ransomware
A particular kind of malicious software used for extortion. read more ...
Retroviruses
Retroviruses are malicious applications trying to disable, delete or deactivate antivirus systems. read more ...
Rootkit
A program or suite of programs (“kit”) intended to escalate privileges (“get root”) and/or maintain covert access and control of a system, i.e. without the knowledge of its owner. read more ...
Social engineering
Term applied to a wide range of techniques for causing a desired change in behavior or gaining some advantage by psychological manipulation of an individual or group. read more ...
Spam
Spearphishing
Spearphishing is a modified form of a phishing attack, where the target -- an individual or small group of people -- are sent wit messages that appear to be from a trusted source, or on a subject of particular interest to the target, often determined via social engineering or collecting information from public sources about the target. read more ...
Spyware
Generic term for a range of surreptitious malware such as keyloggers, Remote Access Trojans, and backdoor Trojans, especially those that allow remote surveillance of passwords and other sensitive data. read more ...
Steganography
The concealment of information inside other data. For example, encoded into audio or visual files read more ...
Trojan, Trojan horse
A trojan (or Trojan) horse (or simply trojan) is a broad term for malicious software used for various nefarious purposes, often either destructive or for purposes of data theft. read more ...
UEFI
The Unified Extensible Firmware Interface identifies, initializes and performs simple diagnostics to test a computer's hardware. read more ...