• Backdoor programs are applications that open computers to access by remote systems. These programs typically respond to specially-built client programs but can be designed to respond to legitimate messaging applications.
  • Bandage Damage Cleanup Template (DCT) is an immediate cleaning solution provided to address system infection cause by a specific malware.
  • Blended threats are bundles of malicious programs that combine the functionality of different types of malware, including Trojans, worms, and backdoors. A blended threat often involves an infection chain which begins with a user visiting a website an
  • Blended threats are bundles of malicious programs that combine the functionality of different types of malware, including Trojans, worms and backdoors.
  • A blocklist (also known as a blacklist) is a list of items in a set that are not accepted. In computer security, a blocklist may be used to exclude which set to detect, quarantine, block, or perform security scans on.
  • Boot sector viruses infect the boot sector or the partition table of a disk. Systems are typically infected by these viruses when started with infected floppy disks.
  • A bot is a remotely controlled Trojan which infects Internet-connected PCs and is remotely controlled by an attacker typically via private IRC channels.
  • A botnet (short for bot network) is a network of hijacked zombie computers controlled remotely by a hacker. The hacker uses the network to send spam and launch Denial of Service attacks, and may rent the network out to other cybercriminals.
  • A botnet [short for bot network] is a network of hijacked zombie computers that are remotely controlled by a hacker. The hacker uses the network to send spam and launch Distributed Denial of Service [DDoS] attacks, and may rent the network out to other cyberc
  • Browser Helper Objects (BHOs) are companion applications for Microsoft Internet Explorer. They usually come in the form of toolbars, search helpers, and monitoring applications.
  • Business Email Compromise (BEC) is a type of scam targeting companies who conduct wire transfers and have suppliers abroad. Corporate or publicly available email accounts of executives or high-level employees related to finance or involved with wire
  • Attacks classified as BPC or ‘business process compromise’ silently alter a part of specific business processes in order to generate significant monetary profit for the attackers.