Skip to main content
go to homepage
Home
Kaspersky Premium
Kaspersky Plus
Kaspersky Standard
Kaspersky Safe Kids
Kaspersky VPN Secure Connection
Kaspersky Password Manager
Renew Licence
Support
Product updates
Trials
Business
KSOS Portal
Trials & Downloads
Renew SMB licence
Find a partner
Company Account
Kaspersky TIP
Support
Cloud Console
Product Training & Certification
Partners
Providers for business
Consumer solutions providers
Partnership with distributors
Find a learning center
Kaspersky United Partner Portal
Become a B2B partner
Become a Build partner
Become a B2C partner
Allowlist Program
About us
Get to know us
Transparency
Corporate News
Press center
Kaspersky Academy
Expertise Centers
Awards & Recognitions
Top 3 Rankings
Sponsorships
Security Bulletin
Case Studies
Policy blog
Careers
Contact us
Home
Business
Partners
About us
My Account
Americas
América Latina
Brasil
United States
Canada - English
Canada - Français
Africa
Afrique Francophone
Maroc
South Africa
Tunisie
Middle East
Middle East (English)
الشرق الأوسط (Arabic)
Western Europe
Belgique & Luxembourg
Danmark
Deutschland & Schweiz
España
France
Italia & Svizzera
Nederland
Norge
Österreich
Portugal
Sverige
Suomi
United Kingdom
Eastern Europe
Česká republika
Magyarország
Polska
România
Srbija
Türkiye
Ελλάδα (Greece)
България (Bulgaria)
Қазақстан - Русский (Kazakhstan - Russian)
Қазақстан - Қазақша (Kazakhstan - Kazakh)
Россия и Белару́сь (Russia & Belarus)
Україна (Ukraine)
Asia & Pacific
Australia
India
Indonesia (Bahasa)
Malaysia - English
Malaysia - Bahasa Melayu
New Zealand
Việt Nam
ไทย (Thailand)
한국 (Korea)
中国 (China)
香港特別行政區 (Hong Kong SAR)
台灣 (Taiwan)
日本語 (Japan)
For all other countries
Global Website
Home
Resource Center
Definitions
Pre-emptive Safety
Threats
Definitions
Definitions
Educate yourself on the terminology used for online security threats, including definitions and descriptions for malware, viruses, and more.
Filter by:
Filter by:
Malicious Programs
Malware
Spam and Phishing
Threats (Definitions)
Virus
Web (Definitions)
WEB (DEFINITIONS)
Subcategory Web (Definitions)
What is Jailbreaking – Definition and Explanation
What is jailbreaking? Jailbreaking is the act of...
Read More
WEB (DEFINITIONS)
Subcategory Web (Definitions)
What is an IP Address – Definition and Explanation
What is an IP address? How can you hide your IP...
Read More
WEB (DEFINITIONS)
Subcategory Web (Definitions)
What is Facial Recognition – Definition and Explanation
What is Facial Recognition – Definition and...
Read More
WEB (DEFINITIONS)
Subcategory Web (Definitions)
What is Doxing? Definition and Explanation
Learn how doxing works, how to report attacks,...
Read More
VIRUS
Subcategory Virus
What is Macro Virus?
Industry definition for the term Macro Virus. A...
Read More
THREATS (DEFINITIONS)
Subcategory Threats (Definitions)
What is Keystroke Logging and Keyloggers?
Keyloggers engage in keystroke logging — creating...
Read More
WEB (DEFINITIONS)
Subcategory Web (Definitions)
What is a firewall? Definition and explanation
Firewalls protect against cyber attacks by...
Read More
MALWARE
Subcategory Malware
What is Ezula?
Industry definition for the term Ezula. Ezula...
Read More
VIRUS
Subcategory Virus
What is Metamorphic Virus?
Industry definition for the term Metamorphic...
Read More
What Is a Drive by Download
Drive by download attacks refer to malicious...
Read More
MALICIOUS PROGRAMS
Subcategory Malicious Programs
What is DNS?
Discover what the DNS is, what it means & how it...
Read More
WEB (DEFINITIONS)
Subcategory Web (Definitions)
What is data mining and why is it important?
Data mining is the process of analyzing data to...
Read More
What is Data Breach? How to Prevent Data Leaks
A data breach is when a vulnerability in a system...
Read More
WEB (DEFINITIONS)
Subcategory Web (Definitions)
What is Cyber Security?
Cyber security is the practice of defending...
Read More
What are Cookies?
We hear about them a lot, but it's difficult to...
Read More
What is clickjacking? How to prevent clickjacking attacks
Clickjacking attacks trick users into clicking on...
Read More
What is Biometrics? How is it used in security?
Biometrics are the biological measurements or...
Read More
MALICIOUS PROGRAMS
Subcategory Malicious Programs
What is Beta Bot?
Industry definition for the term Beta Bot. Beta...
Read More
What Is APT (Advanced Persistent Threat)?
An advanced persistent attack (APT) uses...
Read More
What is Patch Management?
Patch management is the strategy that dictates...
Read More
MALICIOUS PROGRAMS
Subcategory Malicious Programs
What is Malicious code?
Malicious code is computer code that causes...
Read More
Common cryptocurrency scams and how to avoid them
A cryptocurrency scam is a type of investment...
Read More
WEB (DEFINITIONS)
Subcategory Web (Definitions)
How AI and Machine Learning in Cybersecurity are Shaping the Future
AI and machine learning are shaping the future of...
Read More
WEB (DEFINITIONS)
Subcategory Web (Definitions)
QR Code Security: What are QR codes and are they safe to use?
What are QR codes and are they safe to use? A QR...
Read More
Current page, page 1
1
2
3
4
5
6