The Glossary contains several hundred definitions of terms that you might come across in our articles and blogs, or on other information security sites. Unlike the in-depth articles in the Knowledge Base, every definition in the Glossary is succinct, while remaining highly informative.
(This section is currently under construction)
In the Knowledge Base, you will find various articles about common threats, a general classification of malware and unwanted messages, and a brief historical overview of the evolution of these and many other threats.
The Knowledge Base now has three main sections:
– The Detectable Objects section gives detailed information about malicious and potentially dangerous programs that we protect users against every single day all around the world, as well as advice on what to do in case of infection.
– In the Spam and Phishing section, you will learn about phishing and spam mailings, how their creators earn money from them, and how this type of threat has evolved since the 1990s to the present day.
– The articles in the Vulnerabilities and Hackers section is devoted to the topic of software vulnerabilities and how cybercriminals exploit them, as well as legislation and hackers in the broad sense of the word.
VBS is a script language developed by Microsoft. Like JavaScript, it is often used in the development of web pages. For specific tasks, it’s often easier to write a script than to use a formal programming language like ‘C’ or… Read Full Article
A class of programs for remote desktop sharing via the RFB protocol. A VNC system consists of a server installed on the device that connects remotely, and a control client. The client operator is able to work on the remote… Read Full Article
Today the term virus is often loosely used to refer to any type of malicious program, or is used to describe any bad thing that a program does to a computer. Strictly speaking, however, a virus is defined as program… Read Full Article
Vishing, or voice phishing, is a type of digital fraud that seeks to trick victims by means of voice communication, such as over the phone. Read Full Article
A technology for creating a virtual local network as part of a physical local network connected to one or more broadcast domains. A VLAN reduces the load on the network infrastructure, since information transfer requests within the virtual segment do… Read Full Article
VoIP (Voice over IP, IP telephony) is a technology that lets subscribers to the VoIP service make telephone calls using a computer network that supports IP (Internet Protocol). This means that anyone with a broadband Internet connection can replace their… Read Full Article
A VPN (Virtual Private Network) is used to provide staff are working remotely with secure access to the private network of a corporation or other organization, over the Internet. Encryption and other security features are used to maintain privacy and… Read Full Article
A vulnerability is a bug or security flaw that provides the potential for an attacker to gain unauthorized access to, or use of, a computer. The hacker does this by writing specific exploit code. The use of software vulnerabilities (in… Read Full Article