• ActiveX controls are components that add dynamic and interactive features to Web pages. With ActiveX tools, multimedia effects, animation, a nd functional applications can be added to Web sites.
  • Address bar spoofing is a technique which makes a malicious URL appear like a legitimate one. Earlier observations of pop-up address bar spoofing on Internet Explorer® showed that the address bar was padded with special characters to show only a port
  • Adware or "advertising-supported software" refers to any piece of software or application that displays advertisements, usually through pop-up or pop-under windows. While they may be annoying to some users, adware are not inherently malicious and are
  • Different vendors often have their own approaches towards malware detection, which may result in different naming conventions. Aliases are other names used to refer to the same threat.
  • App stores are sites where users browse, download, and buy computing programs or "apps", mostly for mobile devices.
  • Application control is a security technology that recognizes only whitelisted or “good files” and blocks blacklisted or “bad files” passing through any endpoint in an enterprise network. It is useful for securing networks with BYOD (Bring Your Own De
  • Applications are software programs developed for end-users to accomplish specific computing tasks. Apps, on the other hand, mostly refer to programs developed for mobile devices.
  • Advanced persistent threat [APT] is a military term adapted into the information security context that refers to attacks carried out by nation-states. APT-related threats are created by a group of developers using in-house tools that are not usually
  • Arrival method is commonly deemed synonymous to the terms “infection vector” and “infection channel” that both refer to how a particular malware gets inside computer systems. There are different arrival methods for a threat. They can either be:
  • Attachments are files embedded within online communication channels such as emails, instant messages, or social networks. File attachments can come in any form, such as images, documents, or programs.
  • The AutoRun technology is a Windows® feature Microsoft introduced in Windows 95. It allows Windows Explorer to automatically launch programs from inserted storage drives and other media. Its command is rooted into the applications and can&rsquo
  • This is a Windows function that allows applications, such as messaging clients, to immediately launch upon startup. Users can control this through a check box upon installation, or on system settings which uses the MSConfig command.