Terms related to malware, including definitions about viruses and Trojans and other words and phrases about malicious software.
Browse 0-D - MAM
-
- 0-day - A zero-day exploit is one that takes advantage of a security vulner...
- alureon - TDL-4 is sophisticated malware that facilitates the creation an...
- Anna - The Anna Kournikova VBS.SST computer virus, informally known as "Anna...
- Anna Kournikova virus VBS.SST - The Anna Kournikova...
- anti-virus software - Antivirus (or "anti-virus") software is...
- antivirus software - Antivirus (or "anti-virus") software is a...
- attack kit - A crimeware kit, also called an infection, exploit or DIY...
- attack vector - An attack vector is a path or means by which a hack...
- baby botnet - A micro-botnet, also called a mini-botnet or baby botne...
- blended attack - A blended threat is an exploit that combines elem...
- blended exploit - A blended threat is an exploit that combines el...
- blended threat - A blended threat is an exploit that combines elem...
- Bluetooth virus - A mobile phone virus is a computer virus specif...
- Bluetooth worm - A mobile phone virus is a computer virus specific...
- bot worm - A bot worm is a self-replicating malware program that resides...
- bot-worm - A bot worm is a self-replicating malware program that resides...
- botworm - A bot worm is a self-replicating malware program that resides i...
- brand spoof - Phishing is an e-mail fraud method in which the perpetr...
- brand spoofing - Phishing is an e-mail fraud method in which the p...
- bucket brigade - A bucket brigade attack is one in which the attac...
- Cabir - A mobile phone virus is a computer virus specifically adapted for t...
- caller ID spoofing - Caller ID spoofing is a service that allo...
- carding - Phishing is an e-mail fraud method in which the perpetrator sen...
- cell phone virus - A mobile phone virus is a computer virus spec...
- cell phone worm - A mobile phone virus is a computer virus specif...
- cellphone virus - A mobile phone virus is a computer virus specif...
- cellphone worm - A mobile phone virus is a computer virus specific...
- Chernobyl virus - The Chernobyl virus is a computer virus with a ...
- clipboard hijack attack - A clipboard hijacking is an exp...
- content spoofing - Content spoofing is a type of exploit used by...
- crimeware kit - A crimeware kit, also called an infection, exploit ...
- crimeware kit (attack kit) - A crimeware kit, also cal...
- cross site scripting - Cross-site scripting (XSS) is a secur...
- cross-site scripting - Cross-site scripting (XSS) is a secur...
- cross-site scripting (XSS) - Cross-site scripting (XSS...
- cut-and-paste attack - A cut-and-paste attack is an assault ...
- data source object exploit - A data source object (DSO...
- DDoS - On the Internet, a distributed denial-of-service (DDoS) attack is one...
- DDoS attack - On the Internet, a distributed denial-of-service (DDoS)...
- device attack - A device attack is an exploit in which the attacker...
- DHA - A directory harvest attack (DHA) is an attempt to determine the valid e...
- dictionary attack - A dictionary attack is a method of breaking...
- directory harvest attack - A directory harvest attack (D...
- directory harvest attack (DHA) - A directory harve...
- distributed denial of service attack - On th...
- distributed denial-of-service attack - On th...
- distributed denial-of-service attack (DDoS)
- distributed DoS attack - On the Internet, a distributed de...
- domain rotation - Domain rotation is a technique use by malware d...
- drive-by download - A drive-by download is a program that is au...
- drive-by pharming - Drive-by pharming is a vulnerability exploi...
- drive-by spamming - Drive-by spamming is a variation of drive-b...
- driveby download - A drive-by download is a program that is auto...
- DSO exploit - A data source object (DSO) exploit is a form of spyware...
- DSO exploit (data source object exploit)
- e-mail forgery - E-mail spoofing is the forgery of an e-mail heade...
- email spoofing - E-mail spoofing is the forgery of an e-mail heade...
- email virus - An e-mail virus is computer code sent to you as an e-ma...
- ethical worm - An ethical worm is a program that automates network-b...
- exploit - In computing, an exploit is an attack on a computer system, esp...
- fire brigade attack - A bucket brigade attack is one in which...
- fishing - Phishing is an e-mail fraud method in which the perpetrator sen...
- Flexible Mandatory Access Control - Flexible Ma...
- Flexible Mandatory Access Control (FMAC)
- FMAC - Flexible Mandatory Access Control (FMAC) is an ongoing project intend...
- good worm - An ethical worm is a program that automates network-based d...
- government spyware - A government Trojan is spyware installed ...
- government Trojan - A government Trojan is spyware installed on...
- government Trojan - A government Trojan is spyware installed on...
- governmental trojan - A government Trojan is spyware installe...
- hoax - A virus hoax is a false warning about a computer virus.
- host file hijack - IP spoofing, also known as IP address forgery...
- hybrid virus - A hybrid virus (sometimes called a multi-part or mult...
- hybrid virus (multi-part or multipartite virus)
- hybrid virus/worm - A hybrid virus/worm is malicious code that ...
- identity theft - According to the Identity Theft Resource Center, ...
- IFrame - An IFrame (Inline Frame) is an HTML document embedded inside anot...
- IFrame (Inline Frame) - An IFrame (Inline Frame) is an HTML...
- iJacking - According to the Identity Theft Resource Center, identity the...
- ILOVEYOU virus - The ILOVEYOU virus comes in an e-mail note with "...
- IM worm - An IM worm is self-replicating malicious code that spreads in i...
- Inline Frame - An IFrame (Inline Frame) is an HTML document embedded...
- insider threat - An insider threat is a malicious hacker (also cal...
- integrated threat management - Integrated threat man...
- IP address forgery - IP spoofing, also known as IP address for...
- IP spoofing - IP spoofing, also known as IP address forgery, is a hij...
- IP spoofing (IP address forgery or a host file ...
- Kriz virus - Discovered in the fall of 1999, the Kriz virus (known mor...
- Kriz virus (W32.Kriz, W32.Kriz.dr, or PE_KRIZ)
- likejacking - Likejacking is a variation on clickjacking in which mal...
- macro virus - A macro virus is a computer virus that "infects" a Micr...
- malicious software - Malware (for "malicious software") is any...
- malware - Malware (for "malicious software") is any program or file that ...
- malware (malicious software) - Malware (for "malicio...
- Malware: Glossary - This is a glossary of terms related to malw...