Dragonfly 2.0 is the codename given to an evolved, far more sophisticated version of a significant cyber espionage threat, originally discovered by Symantec researchers, called Dragonfly dating back to 2011. The aggressor group... Read More
Decoding, with denotes the process of translating coded data back into its original form. Coded data in cybersecurity and antivirus terminologies implies the activities that involve encryption for data safety and security.... Read More
"Dyre" , also known as Dyreza, is a notorious Trojan horse developed and used by a criminal group known for its specialization in direct attacks on corporate banking systems. This highly dangerous cyber-threat is voluminously... Read More
"Dropper" is a term commonly used in the world of cybersecurity and antivirus protection. It refers to a type of malware specially designed to "drop" or install other types of malicious software (malware) onto a victim's computer... Read More
The term "dark web" refers to encrypted online content that is not indexed by conventional search engines. It is part of the internet that cannot be accessed through ordinary browsers or search engines such as Google. This... Read More
"Drive-by Blocker" refers to a protective tool commonly incorporated into antivirus utilities and Internet security suites that insulate computer systems, networks, and devices from an invasion, called a drive-by download. The... Read More
Deceptive antivirus, also referred to as rogue security software or scareware, is a form of internet fraud that uses social engineering and fear tactics to lead internet users into purchasing fake antivirus software. In effect,... Read More
Deceptive internet security software, sometimes known as "scareware" or "rogue security software", represents a potentially severe threat within cybersecurity landscapes. Cybercriminals primarily utilize this form of software to... Read More
Drive-by-downloads is an insidious technique malicious actors use piggybacking onto seemingly innocuous downloads or even requiring no consent or knowledge anymore from the user before the potentially harmful software installs... Read More
DNSSEC, short for Domain Name System Security Extensions, is a vital internet protocol in cybersecurity as it promotes higher levels of security for data provided by the Domain Name System (DNS). Considering DNS is the mechanism... Read More
Digital threats are potential cyber dangers that harm or disrupt digital devices such as computers, servers, networks, or mobile devices, leading to loss of assets and data. They are malevolent attempts to disrupt or cause harm,... Read More
"Dangerous Link Detector" is an essential tool in the realm of cybersecurity responsible for identifying harmful links in websites, emails, and other digital content. It adds an extra layer of security to help users safeguard... Read More
Data hiding is a critical concept in the broader scope of cybersecurity and antivirus protection, playing a crucial role in protecting sensitive information and maintaining overall system security. data hiding can be described... Read More
Destructive malware signifies a type of malicious software program that causes harm to systems or disrupts system processes. Popularly equated with computer viruses, worms, ransomware, spyware, and Trojan horses, destructive... Read More
A Direct Action Virus is a type of computer virus that operates with classified by its unique method of operation and specific set of targeted files. Understanding the characteristics of such a virus is essential in examining its... Read More
Denial-of-service, more commonly referred to as DoS, is a prevalent issue in the sphere of cybersecurity, often utilized as a cyberattack method where perpetrators seek to make a machine, network, or service temporarily... Read More
Document signing in the context of cybersecurity and antivirus is a digitally powered process of verifying the authenticity, integrity, and non-repudiation of electronic documents. It's a pivotal subset of cryptography and... Read More
"Drive-by Download Prevention" is a significant and essential strategy in cybersecurity that focuses on inhibiting unauthorized and potentially harmful downloads. In the context of cybersecurity and antivirus protocols, drive-by... Read More
DNS protection, or Domain Name System protection, serves an essential role in ensuring internet users' security online. Understanding what DNS protection is, the threats it mitigates, and the overall implications for... Read More
Dashboard reporting is a cornerstone in the field of cybersecurity and antivirus program management. This aspect of logical and digital armor fortification is typically cultivated through technology that promotes data... Read More
| A | | | B | | | C | | | D | | | E | | | F | | | G | | | H | | | I | | | J | | | K | | | L | | | M | |
| N | | | O | | | P | | | Q | | | R | | | S | | | T | | | U | | | V | | | W | | | X | | | Y | | | Z | |
| 1 | | | 2 | | | 3 | | | 4 | | | 7 | | | 8 | |