Skip to main content
Kaspersky logo
Home
Kaspersky Premium
Kaspersky Plus
Kaspersky Standard
Kaspersky Safe Kids
Kaspersky VPN Secure Connection
Kaspersky Password Manager
Renew License
Support
Trials & Downloads
Business
KSOS Portal
Trials & Downloads
Renew SMB license
Find a partner
Company Account
Support
Cloud Console
Product Training & Certification
Partners
Find a reseller
Find a distributor
Partnership with Kaspersky
About us
Get to know us
Transparency
Corporate News
Awards & Recognitions
Top 3 Rankings
Press center
Careers
Sponsorships
Policy blog
Contact us
Home
Business
Partners
About us
My Account
Americas
América Latina
Brasil
United States
Canada - English
Canada - Français
Africa
Afrique Francophone
Algérie
Maroc
South Africa
Tunisie
Middle East
Middle East (English)
الشرق الأوسط (Arabic)
Western Europe
Belgique & Luxembourg
Danmark
Deutschland & Schweiz
España
France
Italia & Svizzera
Nederland
Norge
Österreich
Portugal
Sverige
Suomi
United Kingdom
Eastern Europe
Česká republika
Magyarország
Polska
România
Srbija
Türkiye
Ελλάδα (Greece)
България (Bulgaria)
Қазақстан - Русский (Kazakhstan - Russian)
Қазақстан - Қазақша (Kazakhstan - Kazakh)
Россия и Белару́сь (Russia & Belarus)
Україна (Ukraine)
Asia & Pacific
Australia
India
Indonesia (Bahasa)
Malaysia - English
Malaysia - Bahasa Melayu
New Zealand
Việt Nam
ไทย (Thailand)
한국 (Korea)
中国 (China)
香港特別行政區 (Hong Kong SAR)
台灣 (Taiwan)
日本語 (Japan)
For all other countries
Global Website
Home
Resource Center
Definitions
Pre-emptive Safety
Threats
Definitions
Definitions
Educate yourself on the terminology used for online security threats, including definitions and descriptions for malware, viruses, and more.
Filter by:
Filter by:
Malicious Programs
Malware
Spam and Phishing
Threats (Definitions)
Virus
Web (Definitions)
What is crypto mining? Definition and explanation
Explore the basics, risks, and defences of crypto...
Read More
What is a secure web gateway (SWG)? Understanding its role in digital safety
Discover the importance of secure web gateways...
Read More
What is Clone Phishing?
Clone phishing is a very specific type of...
Read More
What is Malware?
What is malware? Learn about malicious software,...
Read More
What is an eSIM?
Discover what an eSIM is, the benefits or...
Read More
What is a Teardrop attack, and how to prevent them
Some Denial-of-Service (DOS) attacks can be worse...
Read More
What is SMTP Smuggling?
SMTP smuggling is a cybersecurity threat that...
Read More
Social Media Privacy and Prevention
Despite the popularity of these networks, social...
Read More
What are Smart Contracts?
Want to know about the future of global...
Read More
What is Mobile Security? Benefits, Threats, and Best Practices
Should you worry about mobile security? Discover...
Read More
What is Crimeware?
Worried about crimeware on your system or...
Read More
What is Blockchain Security?
If you’re a crypto-user or engaging with...
Read More
CL0P Ransomware: What is it and how does it work?
Minimize the threat of cl0p ransomware by...
Read More
What is Managed Detection and Response (MDR)?
More businesses are turning to MDR, meaning...
Read More
How to Hide My Email: What is Email Masking?
Wondering how to hide your email for better...
Read More
What is Stalkerware? How to Find and Remove Stalkerware
Wondering how someone can track your phone? Learn...
Read More
Data Leakage: How to Prevent Data Breaches?
Data leakage is a common issue, especially for...
Read More
Crypto Wallet Hardware: Hardware Wallet vs Cold Wallets
Crypto wallet hardware and hot wallets are...
Read More
What is security awareness training?
Security awareness training is an important line...
Read More
What is ransomware as a service?
Ransomware as a service has made this particular...
Read More
Tor Browser: What is it and is it safe?
The Tor browser has become popular due to the...
Read More
What is a Dictionary Attack?
Dictionary attacks are a common cybercrime which...
Read More
What is password spraying? How to prevent password spraying attacks
Password spraying is a type of brute force attack...
Read More
What is a Password Vault & What is their Purpose?
Learn what a password vault is, how it’s used &...
Read More
Current page, page 1
1
2
3
4
5
6