-
-
- pop up blocker
- A pop-up blocker (sometimes called a pop-up kille...
- pop up download
- A pop-up download (sometimes called a download ...
- pop up killer
- A pop-up blocker (sometimes called a pop-up killer)...
- pop-up blocker
- A pop-up blocker (sometimes called a pop-up kille...
- pop-up blocker (pop-up killer)
- A pop-up blocker ...
- pop-up download
- A pop-up download (sometimes called a download ...
- pop-up download (or download pop-up)
- A pop...
- pop-up killer
- A pop-up blocker (sometimes called a pop-up killer)...
- potentially unwanted program
- A PUP (potentially un...
- Pretty Good Privacy
- Pretty Good Privacy (PGP) is a popular ...
- Pretty Good Privacy (PGP)
- Pretty Good Privacy (PGP) i...
- principle of least privilege
- The principle of leas...
- principle of least privilege (POLP)
- The pri...
- privacy
- On the Internet, privacy, a major concern of users, can be divi...
- pseudonymous profile
- A pseudonymous profile is a collectio...
- PUP
- A PUP (potentially unwanted program) is a program that may be unwanted,...
- PUP (potentially unwanted program)
- A PUP (po...
- RAT
- A remote access Trojan (RAT) is a malware program that gives an intrude...
- RAT (remote access Trojan)
- A remote access Trojan (R...
- remote access Trojan
- A remote access Trojan (RAT) is a mal...
- robot
- A bot (short for "robot") is a program that operates as an agent fo...
- rootkit
- A rootkit is a collection of tools (programs) that enables admi...
- rootkits
- A rootkit is a collection of tools (programs) that enables ad...
- SafeWeb
- Anonymous Web surfing allows a user to visit Web sites without ...
- scareware
- Scareware is a type of malware designed to trick victims in...
- session cookie
- On the Web, a transient cookie, sometimes called ...
- shareware
- Shareware is software that is distributed free on a trial b...
- snarf attack
- Bluesnarfing is the theft of information from a wirel...
- sniffer keystroke logger
- A keylogger, sometimes called...
- snoopware
- In mobile computing, snoopware is malware that is capable o...
- spam
- Spam is unsolicited e-mail on the Internet.
- spam kit
- A phishing kit is a collection of tools assembled to make it ...
- spambot
- A spambot is a program designed to collect, or harvest, e-mail ...
- spear phishing
- Spear phishing is an e-mail spoofing fraud attemp...
- spear-phishing
- Spear phishing is an e-mail spoofing fraud attemp...
- spearphishing
- Spear phishing is an e-mail spoofing fraud attempt ...
- spybot
- In general, spyware is any technology, such as tracking software,...
- spyware
- In general, spyware is any technology, such as tracking softwar...
- Spyware glossary
- Print out for a handy reference guide or brow...
- system monitor
- A keylogger, sometimes called a keystroke logger,...
- Top 10 Spyware Threats
- Visit our spyware feature page to...
- tracking software
- In general, spyware is any technology, such...
- transient cookie
- On the Web, a transient cookie, sometimes cal...
- transient cookie (session cookie)
- On the Web,...
- trap door
- A back door is a means of access to a computer program that...
- trapdoor
- A back door is a means of access to a computer program that b...
- URL poisoning
- URL poisoning, also known as location poisoning, is...
- URL poisoning (location poisoning)
- URL poiso...
- virus kit
- A phishing kit is a collection of tools assembled to make i...
- VoIP security threats
- As VoIP becomes increasingly preval...
- war driving
- War driving, also called access point mapping, is the a...
- war driving (access point mapping)
- War drivi...
- wardriving
- War driving, also called access point mapping, is the act...
- Web anonymizer
- Anonymous Web surfing allows a user to visit Web ...
- Web beacon
- A Web bug, also known as a Web beacon, is a file object (...
- Web beaconing
- A Web bug, also known as a Web beacon, is a file ob...
- Web bug
- A Web bug, also known as a Web beacon, is a file object (usuall...
- Web bug (Web beacon)
- A Web bug, also known as a Web beacon...
- Web-based malware
- A drive-by download is a program that is au...
- WEP
- Wired Equivalent Privacy (WEP) is a security protocol, specified in the...
- WGA
- Windows Genuine Advantage (WGA) is a program that investigates Windows ...
- What is spyware?
- In general, spyware is any technology that ai...
- Windows Genuine Advantage
- Windows Genuine Advantage (...
- Windows Genuine Advantage (WGA)
- Windows Genuine...
- Wired Equivalent Privacy
- Wired Equivalent Privacy (WEP...
- Wired Equivalent Privacy (WEP)
- Wired Equivalent ...
- wiretap Trojan
- A wiretap Trojan is a program that surreptitiousl...