Under Attack? Call +1 (989) 300-0998

ReasonLabs Cyberpedia

CryptoLocker ransomware

CryptoLocker ransomware is a form of malware that first gained notoriety in 2013 for its widespread and ruthless attacks. As the name suggests, the malware employs a strategy known as ransomware whereby it encrypts files on an...   Read More


Carbanak

Carbanak is a sophisticated and unique form of malware that emerged around 2013 and dramatically reshaped the landscape of cybersecurity threats. Named after the Carba beverage, a favorite off-work treat among the cybersecurity...   Read More


Cloud-based threat intelligence

Cloud-based threat intelligence is reshaping cybersecurity efforts and mechanisms for businesses of all sizes globally. This cybersecurity strategy revolves around leveraging data collection and analysis of threats, gained from...   Read More


CPU

The Central Processing Unit, commonly referred to as the CPU, is often described as the brain of any computer system. It serves as the central unit that processes instructions received from applications, controls relevant...   Read More


Compromised system

A compromised system in the realm of cyber security refers to a computer, network, or information system that has been infiltrated and manipulated by unauthorized individuals, usually cyber criminals or hackers. This unauthorized...   Read More


Counterfeit antivirus

Counterfeit antivirus, also known as rogue antivirus or fake antivirus software, is a type of malware that pretends to be a legitimate security software. It's instrumental in coherent and sophisticated cybersecurity attacks used...   Read More


Cybersecurity Threat

Cybersecurity threats refer to the potential dangers that can compromise the security of a computer system, network, or data. These threats typically originate from the Internet, breaching cyber defenses, and exploiting...   Read More


Covert Channel

Covert channels are a type of vulnerability in cybersecurity that permit processes to transfer information in a manner that violates the system's security policy. Basically, a covert channel is a way of sending information from...   Read More


CEO fraud

CEO fraud, often known as business email compromise (BEC), is a sophisticated scam where cybercriminals trick employees into transferring money or sensitive information by impersonating senior executives or business partners...   Read More


Credential Stealing

Credential stealing is a malicious activity that typically involves unauthorized individuals or entities acquiring confidential information such as usernames, passwords, credit card numbers, or social security numbers, which they...   Read More


Crimeware

Crimeware is a class of malware designed not to cause damage to a computer system but to enable illegal activity. These harmful programs aim to facilitate crimes like identity theft, cyber espionage, phishing, ransomware, or...   Read More


Compliance auditing

Compliance auditing is a significant element in the cybersecurity landscape that aims to ensure various rules and regulations are adhered to, thereby boosting the security posture of an organization. It's an internal or external...   Read More


Cloud Computing

Cloud computing, often referred to as "the cloud", is the delivery of advanced computing services via the internet. Rather than owning their own computing infrastructure or data centers, companies and businesses can use and rent...   Read More


Command and Control server (CnC)

Command and Control Server, also known as the Command and Control (C&C or CnC) server, is a critical staple of operations within the realm of cyber threats, especially in relation to malware or botnets. It masterminds the...   Read More


Credit Card Scams

Credit card scams are a prevalent form of identity theft, where fraudulent activities are carried out using another individual's credit card information. This issue is of particular concern in the realm of cybersecurity because...   Read More


Certificate authority

A Certificate Authority (CA) is a critical aspect of network security infrastructure, playing a fundamental role in cybersecurity and antivirus protocols. Operating as a trusted third-party entity, it validates the identities of...   Read More


Certificate Chain

A "certificate chain" is a string of certificates connected by a common thread of trust, and it's a fundamental component of modern internet security. This chain, also known as a certificate hierarchy, traces a path of trust from...   Read More


CRL

In the realm of cybersecurity and antivirus technology, "CRL" stands for 'Certificate Revocation List'. It is a crucial tool widely used to protect cyber infrastructure. A digital ecosystem thrives on trust, and mechanisms such...   Read More


Certificate Store

A certificate store, in the realm of cybersecurity and antivirus software, is a database on a computing device where digital certificates are stored. These digital certificates are a type of electronic document that, among other...   Read More


Certificate validation

Certificate validation is a crucial element in the landscape of cybersecurity and antivirus operations. This process provides a level of assurance about the integrity of digital platforms, protecting users and their sensitive...   Read More


Previous      1  2  3  4  5  6  7  8  9  10      Next


| A || B || C || D || E || F || G || H || I || J || K || L || M |
| N || O || P || Q || R || S || T || U || V || W || X || Y || Z |
 | 1 || 2 || 3 || 4 || 7 || 8 |