Unsure of some of the terms used in cybersecurity? You’ve come to the right place.
Read our glossary of helpful terms and their definitions.
For the most part, “antivirus” and “anti-malware” mean the same thing. They both refer to software designed to detect, protect against, and remove malicious software. Antivirus software protects against more than viruses–it just uses a slightly antiquated name to describe what it does. Anti-malware just uses a more modern name that encompasses all kinds of malicious software, including viruses.
Malware, or malicious software, is a blanket term for any kind of software with malicious intent. Most online threats are some form of malware. Malware seeks to invade, damage, or disable computers, networks, tablets, and mobile devices, often by taking partial control over a device’s operations. Like the human flu, it interferes with normal functioning.
Ransomware or ransom malware, is an emerging type of malware that prevents users from accessing their device or personal files and demands an anonymous ransom payment in order to regain access.
Adware is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your behavior online so it can target you with specific ads. Typically, it uses an underhanded method to either disguise itself as legitimate, or piggyback on another program to trick you into installing it on your PC, tablet, or mobile device.
Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information like your usernames and passwords, bank details, payment information, and the emails you send and receive.
Trojans are programs that claim to perform one function but actually do another, typically malicious. They use deception and social engineering to trick unsuspecting users into running seemingly benign computer programs that hide malicious ulterior motives. Trojans can take the form of attachments, downloads, and fake videos.
A computer virus is malware attached to another program (such as a document), which can replicate and spread after an initial execution on a target system where human interaction is required. Many viruses are harmful and can destroy data and slow down system resources. Today, cybercriminals aren’t creating new viruses, instead they are focusing their efforts on more sophisticated and lucrative threats.
Identity theft occurs when a criminal obtains or uses the personal information; e.g. name, login, Social Security number, date of birth, etc., of someone else to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way.
Hacking is the process of identifying and exploiting weakness in digital devices, such as computers, smartphones, tablets, and even entire networks to gain unauthorized access to data and system resources. Hackers are motivated by personal gain, to make a statement, or just because they can.
Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication. Typically carried out by email spoofing, instant messaging, text messaging or phone call.
Spoofing is when a cybercriminal disguises himself as another person, business, or entity in order to gain the victim's confidence and commit malicious acts like get access to a system, steal data, or spread malware.
A cyberattack is an assault launched by cybercriminals using one or more computers against a single or multiple computers, smartphones or networks. A cyberattack can maliciously disable devices, steal data, or use a breached device as a launch point for other attacks. Cybercriminals use a variety of methods to launch a cyberattack, including malware, phishing, ransomware etc.
A data breach is the release of confidential, private, or otherwise sensitive information to an unauthorized person or into an unsecured environment. A data breach can occur accidentally, or as the result of a cyberattack.
A DDoS attack is an attempt to make an online service unavailable by overwhelming it with false traffic from multiple sources.This may be combined with an extortion threat of a more devastating attack unless the company pays a cryptocurrency ransom.
Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. Most of the time, spamming is commercial in nature, and though the spam is bothersome, it isn’t necessarily malicious or fraudulent (though sometimes it can be a serious threat).
Pharming is a kind of cyberattack in which criminals redirect internet users trying to reach a specific website to a different, fake site for the purpose of stealing usernames, passwords, social security numbers, financial data, and other personal information.
(c) RedFox Cyber Security App by NTrigo