Definition

  • Password cracking applications are programs that are designed to crack into password-protected systems.
    Read more
  • The pattern file is a database containing information that allows antivirus software to identify viruses.
    Read more
  • A payload is the action that a threat performs, apart from its main behavior. Payloads can range from stealing personal information to deleting the contents of a hard drive.
    Read more
  • The Portable Document Format (PDF) is a file format that is commonly used for transferring documents online. PDF files are displayed the same way on any system, regardless of the system’s hardware, software, and operating system.
    Read more
  • Pharming sets up a website that contains copies of pages from a legitimate website in order to capture confidential information from users, such as credit card, bank account, social security numbers and other sensitive personal information.
    Read more
  • Phishing is a form of identity theft in which a scammer uses an authentic-looking email from a legitimate business to trick recipients into giving out sensitive personal information.
    Read more
  • Polymorphic viruses are complex file infectors that change physical forms, yet retain the same basic routines, after every infection.
    Read more
  • This technique uses a script that opens a legitimate Web site in the background, while a spoofed pop-up window, usually identical to the legitimate Web site, is opened in the foreground.
    Read more
  • A hardware location for passing data in and out of a computing device. Personal computers have various types of internal and external ports for connecting different devices and peripherals.
    Read more
  • The Portable Executable format is the standard file format for executables, object code and Dynamic Link Libraries (DLLs) used in 32- and 64-bit versions of Windows operating systems.
    Read more
  • Point of Sale (PoS) malware is malware that gets information gathered from the credit cards by the application running on the PoS system and steals it, similar to how an information stealer would from a browser.
    Read more
  • Potentially unwanted application or applications refer to programs installed in a mobile device that may pose high risk or have untoward impact on user security and/or privacy.
    Read more
  • A proof-of-concept threat is the earliest implementation of a threat and usually contains code that runs on new platforms and programs or takes advantage of newly discovered vulnerabilities.
    Read more
  • A set of rules enabling computers or devices to exchange data with one another with as few errors as possible. The rules govern issues such as error checking and data compression .
    Read more
  • A proxy server is a server that sits between a client and a web server and represents itself to each end as being the other.
    Read more

Connect with us on