CryptoLocker ransomware is a form of malware that first gained notoriety in 2013 for its widespread and ruthless attacks. As the name suggests, the malware employs a strategy known as ransomware whereby it encrypts files on an... Read More
Carbanak is a sophisticated and unique form of malware that emerged around 2013 and dramatically reshaped the landscape of cybersecurity threats. Named after the Carba beverage, a favorite off-work treat among the cybersecurity... Read More
Cloud-based threat intelligence is reshaping cybersecurity efforts and mechanisms for businesses of all sizes globally. This cybersecurity strategy revolves around leveraging data collection and analysis of threats, gained from... Read More
The Central Processing Unit, commonly referred to as the CPU, is often described as the brain of any computer system. It serves as the central unit that processes instructions received from applications, controls relevant... Read More
A compromised system in the realm of cyber security refers to a computer, network, or information system that has been infiltrated and manipulated by unauthorized individuals, usually cyber criminals or hackers. This unauthorized... Read More
Counterfeit antivirus, also known as rogue antivirus or fake antivirus software, is a type of malware that pretends to be a legitimate security software. It's instrumental in coherent and sophisticated cybersecurity attacks used... Read More
Cybersecurity threats refer to the potential dangers that can compromise the security of a computer system, network, or data. These threats typically originate from the Internet, breaching cyber defenses, and exploiting... Read More
Covert channels are a type of vulnerability in cybersecurity that permit processes to transfer information in a manner that violates the system's security policy. Basically, a covert channel is a way of sending information from... Read More
CEO fraud, often known as business email compromise (BEC), is a sophisticated scam where cybercriminals trick employees into transferring money or sensitive information by impersonating senior executives or business partners... Read More
Credential stealing is a malicious activity that typically involves unauthorized individuals or entities acquiring confidential information such as usernames, passwords, credit card numbers, or social security numbers, which they... Read More
Crimeware is a class of malware designed not to cause damage to a computer system but to enable illegal activity. These harmful programs aim to facilitate crimes like identity theft, cyber espionage, phishing, ransomware, or... Read More
Compliance auditing is a significant element in the cybersecurity landscape that aims to ensure various rules and regulations are adhered to, thereby boosting the security posture of an organization. It's an internal or external... Read More
Cloud computing, often referred to as "the cloud", is the delivery of advanced computing services via the internet. Rather than owning their own computing infrastructure or data centers, companies and businesses can use and rent... Read More
Command and Control Server, also known as the Command and Control (C&C or CnC) server, is a critical staple of operations within the realm of cyber threats, especially in relation to malware or botnets. It masterminds the... Read More
Credit card scams are a prevalent form of identity theft, where fraudulent activities are carried out using another individual's credit card information. This issue is of particular concern in the realm of cybersecurity because... Read More
A Certificate Authority (CA) is a critical aspect of network security infrastructure, playing a fundamental role in cybersecurity and antivirus protocols. Operating as a trusted third-party entity, it validates the identities of... Read More
A "certificate chain" is a string of certificates connected by a common thread of trust, and it's a fundamental component of modern internet security. This chain, also known as a certificate hierarchy, traces a path of trust from... Read More
In the realm of cybersecurity and antivirus technology, "CRL" stands for 'Certificate Revocation List'. It is a crucial tool widely used to protect cyber infrastructure. A digital ecosystem thrives on trust, and mechanisms such... Read More
A certificate store, in the realm of cybersecurity and antivirus software, is a database on a computing device where digital certificates are stored. These digital certificates are a type of electronic document that, among other... Read More
Certificate validation is a crucial element in the landscape of cybersecurity and antivirus operations. This process provides a level of assurance about the integrity of digital platforms, protecting users and their sensitive... Read More
| A | | | B | | | C | | | D | | | E | | | F | | | G | | | H | | | I | | | J | | | K | | | L | | | M | |
| N | | | O | | | P | | | Q | | | R | | | S | | | T | | | U | | | V | | | W | | | X | | | Y | | | Z | |
| 1 | | | 2 | | | 3 | | | 4 | | | 7 | | | 8 | |