A "Format String Vulnerability" is a serious security vulnerability that occurs in software programming. Its occurrence originates from the usage of unfiltered user-input as the format string parameter in certain C standard... Read More
Function Hooking is a technique used particularly in antivirus technology that grants efficient control over the behavior of specific functions. function hooking alters or upgrades the typical behavior of runtime function calls... Read More
File-less malware, as the term suggests, is a form of malicious software that doesn't rely on traditional files on the hard drive to carry out its malicious activities. Existing primarily in the computer memory, it can... Read More
Folder Encryption is a principal method of securing data stored on a digital medium like a computer or online drive. It helps to ensure the confidentiality, integrity, and accessibility of the stored data by using algorithms to... Read More
The term "File infector" is a common one, referring to a category of malicious software or malware designed to corrupt, change, or infect files in a computer system or network. The broader context in which File infectors operate,... Read More
FinSpy, also known as FinFisher, is a highly controversial piece of software typically categorized as a surveillance tool. It has raised deep questions throughout the cybersecurity and antivirus community due to its use and... Read More
Flame malware, also known as Flamer, sKyWIper or Skywiper, is a highly sophisticated, complex and elusive cyber espionage weapon designed to gather sensitive data. Uncovered by security researchers around 2012, it is considered... Read More
Filtering in the context of cybersecurity and antivirus involves the process of screening, distinguishing, and managing the flow and access of data in a computer system or network to protect against malicious activities and... Read More
Financial malware refers to malicious software used to conduct illegal activities involving finance and monetary channels. Such activities broadly comprise stealing banking details, unauthorized fund transfers, interrupting... Read More
Form grabber is a type of malware, explicitly designed to capture and exfiltrate data submitted through web forms, typically those found on login pages or checkout pages on e-commerce sites. In some contexts, it is often referred... Read More
A fake banking app is the latest weapon wielded by cybercriminals intending to mine sensitive financial data from unsuspecting customers. It replicates the official banking app of renowned banking institutions to convince people... Read More
FIN7 and FIN8 are two prominent hacking groups that have earned a substantial degree of notoriety in the world of cybersecurity during recent years. Causing disturbances at the global level, these entities continue to pose... Read More
File scanning is an essential part of antivirus solutions and cybersecurity measures. It can be defined as systematically checking and analyzing files on a computer system or a network to detect potential threats, including... Read More
File Locker is a term commonly used in cybersecurity to denote software that helps you in maintaining the confidentiality and security of your digital assets. As the name suggests, it allows you to 'lock' or secure files, thus... Read More
Fraudulent security software, often known as rogue security software or scams, is one of the biggest threats in the world of cybersecurity today. It is a form of internet fraud that uses manipulative and fear-driven tactics to... Read More
Faux antivirus is a term used to describe malicious software that poses as legitimate antivirus or security software. This fraudulent software causes more harm to the user's system instead of providing protection, hence the term... Read More
"Fake virus protection" is a term that refers to deceptive software that masquerades as legitimate antivirus programs but, in reality, have malicious intent and potentially harmful effects. This category of malicious software is... Read More
False positive alerts, in the context of cybersecurity and antivirus defenses, refer to occurrences when these defenses mistakenly identify legitimate, non-malicious activities as harmful or having intent to cause harm. This... Read More
Fake malware removal tools indicate software that creators purport to be legitimate antivirus or anti-malware programs, but, in reality, are markedly harmful and malicious. They form part of the broader ecosystem of deceptive... Read More
A fraudulent system optimizer is a type of malicious software (malware) that masquerades itself as a useful tool designed to improve or optimize a computer's performance. They present themselves as beneficial programs providing... Read More
| A | | | B | | | C | | | D | | | E | | | F | | | G | | | H | | | I | | | J | | | K | | | L | | | M | |
| N | | | O | | | P | | | Q | | | R | | | S | | | T | | | U | | | V | | | W | | | X | | | Y | | | Z | |
| 1 | | | 2 | | | 3 | | | 4 | | | 7 | | | 8 | |