Browse Definitions :
327 results for:

malware

malware (malicious software)

Definition | searchSecurity

Malware is software that is harmful to users or their computing systems. Find out about the different kinds of malware and what they can do.

POS malware (point-of-sale malware)

Definition | WhatIs.com

Point-of-sale malware (POS malware) is malicious software expressly written to steal customer payment data -- especially credit card data -- from ...

Malware: Glossary

Definition | SearchSecurity

This is a glossary of terms related to malware.

cryptomining malware

Definition | WhatIs.com

Cryptomining malware is a form of malware that takes over a computer or mobile device's resources and uses them to perform cryptocurrency mining, a ...

antimalware (anti-malware)

Definition | SearchSecurity

Antimalware (anti-malware) is a type of software program designed to prevent, detect and remove malicious software (malware) on IT systems, as well ...

mobile malware

Definition | SearchMobileComputing

Mobile malware is malicious software specifically written to attack mobile devices such as smartphones, tablets, and smartwatches.

memory-scraping malware

Definition | SearchSecurity

Memory-scraping malware is a type of malware that helps hackers to find personal data. It examines memory to search for sensitive data that is not ...

pre-installed malware

Definition | WhatIs.com

Pre-installed malware is malicious software that is put on a machine before it is delivered to the user. New devices are usually assumed to be ...

Regin malware

Definition | SearchSecurity

Regin is a complex strain of back-door Trojan malware that uses a multi-staged, modular approach to infect its targets for the purpose of monitoring ...

fileless malware attack

Definition | WhatIs.com

A fileless malware attack is a type of malicious attack a hacker can use to leverage applications already installed in a computer.

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit. The term has its roots in the ...

  • passphrase

    A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that ...

  • Web application firewall (WAF)

    A Web application firewall (WAF) is a firewall that monitors, filters or blocks traffic to and from a Web application. WAFs are ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • computational storage

    Computational storage is defined as an architecture that couples compute with storage in order to reduce data movement. In doing ...

  • data deduplication

    Data deduplication -- often called intelligent compression or single-instance storage -- is a process that eliminates redundant ...

  • public cloud storage

    Public cloud storage, also called storage-as-a-service or online storage is a service model that provides data storage on a ...

Close