Cloud-based analysis is a powerful technology associated with the field of cybersecurity and antivirus. It represents a potent tool that constitutes an integral part of many modern risk management, malware prevention, and data... Read More
A Command-and-Control (C&C or C2) server is a critical tool in the arsenal of cyber criminals and plays a leading role in the management of distributed networks of infected computers, otherwise known as botnets. Usage of the C&C... Read More
Credential theft is a critical challenge in the domains of cybersecurity and antivirus efforts. It is a technique used by cybercriminals to steal the access details (credentials) of users. Credentials consist of usernames,... Read More
Clipboard stealing is a cybersecurity threat that is emerging as a major concern in the highly digital world we live in today. This term refers to a specific type of cyberattack where the attacker takes control of a victim's... Read More
The world of cybersecurity is an incessant battleground, filled with hackers, malware, and several forms of cyber threats. One such term constantly appearing in this context is the Command and Control server, also known as C&C,... Read More
Cryptojacking is a malicious cybersecurity breach, rivaling ransomware, phishing attacks, and other forms of cybercrime in its escalating prevalence. Stemming from the surge in popularity and value of cryptocurrency such as... Read More
Credit card theft refers to illegal actions involving unauthorized access to a person's credit card information for fraudulent purposes. It is a widespread form of financial fraud that exposes victims to serious harm such as... Read More
Code injection, within the context of cybersecurity and antivirus programming, refers to the malicious activity of inserting harmful code into an application or system with the intent of causing unauthorized behavior. It is an... Read More
Cyber espionage is an evolving menace in the digital community, given the rampant advancement of technology and global internet extent. This act mainly involves the unauthorized probing and tracking of sensitive, private, or... Read More
Cyber warfare refers to the significant and increasingly real battleground portrayed into the virtual world of computing in the context of national defense and international relations. It happens when one nation state... Read More
Cyber resilience is a crucial concept within the realm of cybersecurity that pertains to an organization's ability to continue carrying out its business obligations by protecting against, defending, recovering, and swiftly... Read More
Cyber risk management is a strategic approach that organizations use to handle the potential threats triggered by the usage of digital systems and online networks. In this era of rapid technological advancement, unending streams... Read More
Cyber threat intelligence is a core facet of cybersecurity practices that sandwiches between preventive measures and reactive responses. it involves the analysis and interpretation of data related to potential cyber threats such... Read More
Cyber incident response refers to the systematic approach handled by an organization or individuals to manage the aftermath of a security breach or attack, also known as a cyber incident. The key goal of such a setup is to handle... Read More
Code morphing refers to a fascinating defensive mechanism whereby a computer program or malware's source code continuously changes while the functionality remains unaffected. This cunning trick is engineered to evade antivirus... Read More
Code obfuscation, in the context of cybersecurity and antivirus applications, refers to a technique utilized to protect software codes from unauthorized access, manipulation, and reverse engineering. It’s about camouflaging or... Read More
Code polymorphism is a concept in computer science that refers to the ability of different objects and data types to be processed in the same way. This is possible through the use of a single interface, shared by different... Read More
Clickjacking, also known as UI redressing, is a malicious technique that manipulators use to trick web users into revealing confidential information or to take control of their computer actions while they interact with seemingly... Read More
Cloud backup, also known as online backup or remote backup, is a technique that involves sending a copy of data over a public or private network to an off-site server, often hosted by a third party service provider. Cloud backup... Read More
Cloud-based security refers to a high-tech method of providing cybersecurity protections at a network level using cloud computing. It is rapidly becoming a preferred security method for businesses and organizations that use cloud... Read More
| A | | | B | | | C | | | D | | | E | | | F | | | G | | | H | | | I | | | J | | | K | | | L | | | M | |
| N | | | O | | | P | | | Q | | | R | | | S | | | T | | | U | | | V | | | W | | | X | | | Y | | | Z | |
| 1 | | | 2 | | | 3 | | | 4 | | | 7 | | | 8 | |