Under Attack? Call +1 (989) 300-0998

ReasonLabs Cyberpedia

Dragonfly 2.0

Dragonfly 2.0 is the codename given to an evolved, far more sophisticated version of a significant cyber espionage threat, originally discovered by Symantec researchers, called Dragonfly dating back to 2011. The aggressor group...   Read More


Decoding

Decoding, with denotes the process of translating coded data back into its original form. Coded data in cybersecurity and antivirus terminologies implies the activities that involve encryption for data safety and security....   Read More


Dyre

"Dyre" , also known as Dyreza, is a notorious Trojan horse developed and used by a criminal group known for its specialization in direct attacks on corporate banking systems. This highly dangerous cyber-threat is voluminously...   Read More


Dropper

"Dropper" is a term commonly used in the world of cybersecurity and antivirus protection. It refers to a type of malware specially designed to "drop" or install other types of malicious software (malware) onto a victim's computer...   Read More


Dark Web

The term "dark web" refers to encrypted online content that is not indexed by conventional search engines. It is part of the internet that cannot be accessed through ordinary browsers or search engines such as Google. This...   Read More


Drive-by Blocker

"Drive-by Blocker" refers to a protective tool commonly incorporated into antivirus utilities and Internet security suites that insulate computer systems, networks, and devices from an invasion, called a drive-by download. The...   Read More


Deceptive antivirus

Deceptive antivirus, also referred to as rogue security software or scareware, is a form of internet fraud that uses social engineering and fear tactics to lead internet users into purchasing fake antivirus software. In effect,...   Read More


Deceptive internet security software

Deceptive internet security software, sometimes known as "scareware" or "rogue security software", represents a potentially severe threat within cybersecurity landscapes. Cybercriminals primarily utilize this form of software to...   Read More


Drive-by-downloads

Drive-by-downloads is an insidious technique malicious actors use piggybacking onto seemingly innocuous downloads or even requiring no consent or knowledge anymore from the user before the potentially harmful software installs...   Read More


DNSSEC

DNSSEC, short for Domain Name System Security Extensions, is a vital internet protocol in cybersecurity as it promotes higher levels of security for data provided by the Domain Name System (DNS). Considering DNS is the mechanism...   Read More


Digital Threats

Digital threats are potential cyber dangers that harm or disrupt digital devices such as computers, servers, networks, or mobile devices, leading to loss of assets and data. They are malevolent attempts to disrupt or cause harm,...   Read More


Dangerous Link Detector

"Dangerous Link Detector" is an essential tool in the realm of cybersecurity responsible for identifying harmful links in websites, emails, and other digital content. It adds an extra layer of security to help users safeguard...   Read More


Data Hiding

Data hiding is a critical concept in the broader scope of cybersecurity and antivirus protection, playing a crucial role in protecting sensitive information and maintaining overall system security. data hiding can be described...   Read More


Destructive malware

Destructive malware signifies a type of malicious software program that causes harm to systems or disrupts system processes. Popularly equated with computer viruses, worms, ransomware, spyware, and Trojan horses, destructive...   Read More


Direct action virus

A Direct Action Virus is a type of computer virus that operates with classified by its unique method of operation and specific set of targeted files. Understanding the characteristics of such a virus is essential in examining its...   Read More


Denial-of-Service (DoS)

Denial-of-service, more commonly referred to as DoS, is a prevalent issue in the sphere of cybersecurity, often utilized as a cyberattack method where perpetrators seek to make a machine, network, or service temporarily...   Read More


Document Signing

Document signing in the context of cybersecurity and antivirus is a digitally powered process of verifying the authenticity, integrity, and non-repudiation of electronic documents. It's a pivotal subset of cryptography and...   Read More


Drive-by Download Prevention

"Drive-by Download Prevention" is a significant and essential strategy in cybersecurity that focuses on inhibiting unauthorized and potentially harmful downloads. In the context of cybersecurity and antivirus protocols, drive-by...   Read More


DNS protection

DNS protection, or Domain Name System protection, serves an essential role in ensuring internet users' security online. Understanding what DNS protection is, the threats it mitigates, and the overall implications for...   Read More


Dashboard reporting

Dashboard reporting is a cornerstone in the field of cybersecurity and antivirus program management. This aspect of logical and digital armor fortification is typically cultivated through technology that promotes data...   Read More


Previous      1  2  3  4  5  6  7  8  9  10      Next


| A || B || C || D || E || F || G || H || I || J || K || L || M |
| N || O || P || Q || R || S || T || U || V || W || X || Y || Z |
 | 1 || 2 || 3 || 4 || 7 || 8 |