Control Flow Guard (CFG) is a highly impactful, security mechanism available mainly for applications running on Windows operating systems, notably Windows 10. Developed by Microsoft, CFG is an innovative feature created to... Read More
Code optimization refers to a computer programming phase in which a code is refined and tweaked to enhance overall system performance in terms of speed and operation. Optimized codes are far superior to ordinary codes, decrease... Read More
Card skimming is a blanket term used in cybersecurity circles to describe the unauthorized and malicious acquisition of data from the magnetic strip of credit, debit, or ATM cards. This type of security breach is a global problem... Read More
Charge-based fraud is a form of malicious activity that is increasingly prevalent in the cyber-security landscape. In the most fundamental sense, this fraudulent action involves criminals utilizing stolen or fraudulent credit... Read More
Connected car fraud is an evolving type of cyber-crime that is currently causing concern amongst both automobile manufacturers and consumers across the globe. Connected cars, also known as 'smart cars', are those that have an... Read More
Cloud sync is a prominent feature in modern software that allows for real-time updating and transferring of files across multiple devices connected to the internet. This adaption has not only become an expectation among consumers... Read More
When discussing cybersecurity and antivirus, a vital term to understand is the "Credit Card PIN." PIN, an acronym for Personal Identification Number, is typically a secret numeric password that's embodied in a credit card to... Read More
CCTV, or Closed-Circuit Television, is a term referring to a surveillance system that uses video cameras to transmit signals to specific, predetermined monitors. The term 'closed-circuit' highlights that the system operates... Read More
Crime prevention refers to the assortment of steps and tactics employed to deter, obstruct, and minimize criminal acts or behavior, which relates to activities generated to address cybercrime. Cybercrime entails illegal... Read More
Contingency planning is a crucial aspect of strategic preparation in various fields, including cybersecurity and antivirus protection. It refers to the process wherein an organization or an individual develops and implements... Read More
Compliance audits are a critical procedure that checks whether an organization's internal practices, operations, and activities align with prescribed regulations, standards, guidelines, or stipulations. Conducting regular... Read More
Cross-Site Request Forgery (CSRF), often pronounced "sea-surf", is an assault that tricks the victim into submitting a malicious request. This attack specifically targets state-changing requests, not data theft, because the... Read More
"Control Flow Hijacking" is a method employed by hackers in an effort to make a system behave against its intended purpose through a cyber-attack. At a higher level, it represents any strategy that manipulates a program or... Read More
Control-flow Integrity (CFI) is a crucial element in cybersecurity and antivirus systems intending to prevent the manipulation of the destination of indirect branches by attackers. The purpose of this technology is to detect and... Read More
"Credential Guard" is an advanced feature primarily available in Windows 10 enterprise that evolves the approach to how sensitive security data like credentials is stored in a Windows environment, transitioning from the isolated... Read More
Cloud Sandbox is a term used most commonly in cybersecurity and antivirus technology. It refers to a secure and isolated computer system environment where a program, file, or system can be executed and analyzed for malicious... Read More
Claims-based authentication is a digital identification process widely used in the realm of cybersecurity and antivirus protections. It simplifies authentication by allowing applications to authenticate a user without needing to... Read More
Centralized Authentication refers to an approach within cybersecurity where multiple systems rely on a single system to authenticate users or systems. Rather than having numerous individual systems perform their own... Read More
First and foremost, "Consumer Antivirus" refers to a particular type of software designed specifically to safeguard personal computers, smartphones, and other devices utilized by individuals as opposed to corporate or enterprise... Read More
Cookie Poisoning, prevalent in the domain of cybersecurity and antivirus mechanisms, is a renowned technique exploited by hackers to manipulate or modify cookies, the small pieces of data exchanged between a server and a web... Read More
| A | | | B | | | C | | | D | | | E | | | F | | | G | | | H | | | I | | | J | | | K | | | L | | | M | |
| N | | | O | | | P | | | Q | | | R | | | S | | | T | | | U | | | V | | | W | | | X | | | Y | | | Z | |
| 1 | | | 2 | | | 3 | | | 4 | | | 7 | | | 8 | |