Master Boot Record

Located in the very first sector at the beginning of a hard disk, the Master Boot Record (MBR) is a combination of a program code and data used by that program (the so-called partition table read more ...


Memory Dump

A copy of the system memory at the time of a system crash (blue screen of death), mostly used for application troubleshooting and debugging read more ...


Overwriting viruses

Overwriting viruses are the simplest forms of infection. The original code is deleted and replaced by new, malicious code. When the substituted file is executed the virus can try to replicate again. read more ...


Packer, Crypter, Protector

Packers are the “outer shells” of some trojan horses, the purpose of which is to make detection and analysis by anti-virus software and malware analysts (respectively) more difficult by hiding the payload they contain, making it first necessary to unpack them so as to ascertain their purpose. read more ...


Phishing

A play on the word "fishing" deceptive email, texts or other messages sent to a target in order to steal their account credentials. read more ...


Polymorphism

Polymorphism is the term used to describe a program that changes the order in which its instructions are stored on disk, executed in memory, etc.  read more ...


PUA

Grayware (or PUA - a Potentially Unwanted Application) is a broad category of software, whose intent is not as unequivocally malicious as with other types of malware, such as viruses or trojan horses. read more ...


Quarantine

The main task of the anti-virus quarantine is to safely store infected files in order to prevent their being accidentally run and performing malicious actions. read more ...


Ransomware

A particular kind of malicious software used for extortion.  read more ...


Retroviruses

Retroviruses are malicious applications trying to disable, delete or deactivate antivirus systems. read more ...


Rootkit

A program or suite of programs (“kit”) intended to escalate privileges (“get root”) and/or maintain covert access and control of a system, i.e. without the knowledge of its owner.  read more ...


Social engineering

Term applied to a wide range of techniques for causing a desired change in behavior or gaining some advantage by psychological manipulation of an individual or group.  read more ...


Spam

 read more ...


Spearphishing

Spearphishing is a modified form of a phishing attack, where the target -- an individual or small group of people -- are sent wit messages that appear to be from a trusted source, or on a subject of particular interest to the target, often determined via social engineering or collecting information from public sources about the target. read more ...


Spyware

Generic term for a range of surreptitious malware such as keyloggers, Remote Access Trojans, and backdoor Trojans, especially those that allow remote surveillance of passwords and other sensitive data. read more ...


Steganography

The concealment of information inside other data. For example, encoded into audio or visual files read more ...


Trojan, Trojan horse

A trojan (or Trojan) horse (or simply trojan) is a broad term for malicious software used for various nefarious purposes, often either destructive or for purposes of data theft. read more ...


Virus

Virus is a program able to self-replicate. It spreads by inserting copies of itself into other executable files and ensures their execution. read more ...


Worm

A worm is a self-replicating type of malware that can spread to other computers. Worms can spread through computer networks, e-mails, instant-messaging services, social networks, removable media and other channels. read more ...


Zero-day

A new, unpatched vulnerability which is used to perform an attack. read more ...

Please enable Javascript to ensure correct displaying of this content and refresh this page.