The Glossary contains several hundred definitions of terms that you might come across in our articles and blogs, or on other information security sites. Unlike the in-depth articles in the Knowledge Base, every definition in the Glossary is succinct, while remaining highly informative.
(This section is currently under construction)
In the Knowledge Base, you will find various articles about common threats, a general classification of malware and unwanted messages, and a brief historical overview of the evolution of these and many other threats.
The Knowledge Base now has three main sections:
– The Detectable Objects section gives detailed information about malicious and potentially dangerous programs that we protect users against every single day all around the world, as well as advice on what to do in case of infection.
– In the Spam and Phishing section, you will learn about phishing and spam mailings, how their creators earn money from them, and how this type of threat has evolved since the 1990s to the present day.
– The articles in the Vulnerabilities and Hackers section is devoted to the topic of software vulnerabilities and how cybercriminals exploit them, as well as legislation and hackers in the broad sense of the word.
A jailbreak is the act of hacking the iOS operating system to gain access to functions off limits to the user. This gives owners of Apple mobile devices full control over the file system, and lets them install programs from… Read Full Article
Java Script is a script language developed by Netscape. Like VBS, JavaScript is often used in the development of web pages. For specific tasks, it’s often easier to write a script than to use a formal programming language like ‘C’… Read Full Article
An open data representation standard based on JavaScript. It is used to transfer structured information and data objects in computer programs. JSON applies data organization methods that are common to most programming languages: key-value pairs and an ordered list of… Read Full Article