Skip to main content
Kaspersky logo
Home
Kaspersky Premium
Kaspersky Plus
Kaspersky Standard
Kaspersky Safe Kids
Kaspersky VPN Secure Connection
Kaspersky Password Manager
Renew License
Support
Trials & Downloads
Business
KSOS Portal
Trials & Downloads
Renew SMB license
Find a partner
Company Account
Support
Cloud Console
Product Training & Certification
Partners
Find a reseller
Find a distributor
Partnership with Kaspersky
About us
Get to know us
Transparency
Corporate News
Kaspersky Academy
Awards & Recognitions
Top 3 Rankings
Press center
Careers
Sponsorships
Policy blog
Contact us
Home
Business
Partners
About us
My Account
Americas
América Latina
Brasil
United States
Canada - English
Canada - Français
Africa
Afrique Francophone
Maroc
South Africa
Tunisie
Middle East
Middle East (English)
الشرق الأوسط (Arabic)
Western Europe
Belgique & Luxembourg
Danmark
Deutschland & Schweiz
España
France
Italia & Svizzera
Nederland
Norge
Österreich
Portugal
Sverige
Suomi
United Kingdom
Eastern Europe
Česká republika
Magyarország
Polska
România
Srbija
Türkiye
Ελλάδα (Greece)
България (Bulgaria)
Қазақстан - Русский (Kazakhstan - Russian)
Қазақстан - Қазақша (Kazakhstan - Kazakh)
Россия и Белару́сь (Russia & Belarus)
Україна (Ukraine)
Asia & Pacific
Australia
India
Indonesia (Bahasa)
Malaysia - English
Malaysia - Bahasa Melayu
New Zealand
Việt Nam
ไทย (Thailand)
한국 (Korea)
中国 (China)
香港特別行政區 (Hong Kong SAR)
台灣 (Taiwan)
日本語 (Japan)
For all other countries
Global Website
Home
Resource Center
Definitions
Pre-emptive Safety
Threats
Definitions
Definitions
Educate yourself on the terminology used for online security threats, including definitions and descriptions for malware, viruses, and more.
Filter by:
Filter by:
Malicious Programs
Malware
Spam and Phishing
Threats (Definitions)
Virus
Web (Definitions)
What is Digital Forensics?
Who is responsible for cybercrime, and how can...
Read More
What is WPA2 (Wireless Protected Access 2)?
WPA2 security is essential for keeping your...
Read More
What is passwordless authentication and how does it work
Discover how passwordless authentication works,...
Read More
What is identity theft and how to prevent it
Identity theft can lead to serious consequences....
Read More
Preparing for Quantum Computing in Cybersecurity
Is quantum computing the greatest cybersecurity...
Read More
What is Data Integrity and Why is it Important?
Maintaining data integrity is crucial for...
Read More
What is APK and How to Install APK on Your Phone
APK applications are the backbone of Android...
Read More
What is PII? How do I remove my information from the internet?
Online activity produces a lot of personal data...
Read More
What is an AI Hallucination?
AI hallucinations can lead to false or misleading...
Read More
What is Quishing? How to protect yourself from QR code phishing
Learn about QR code phishing, including the...
Read More
What is ethical hacking?
Ethical hackers can be useful for organizations...
Read More
What is a Passphrase?
If you’re wondering what a passphrase is or about...
Read More
What is crypto mining? Definition and explanation
Explore the basics, risks, and defences of crypto...
Read More
What is a secure web gateway (SWG)? Understanding its role in digital safety
Discover the importance of secure web gateways...
Read More
What is Clone Phishing?
Clone phishing is a very specific type of...
Read More
What is Malware?
What is malware? Learn about malicious software,...
Read More
What is an eSIM?
Discover what an eSIM is, the benefits or...
Read More
What is a Teardrop attack, and how to prevent them
Some Denial-of-Service (DOS) attacks can be worse...
Read More
What is SMTP Smuggling?
SMTP smuggling is a cybersecurity threat that...
Read More
Social Media Privacy and Prevention
Despite the popularity of these networks, social...
Read More
What are Smart Contracts?
Want to know about the future of global...
Read More
What is Mobile Security? Benefits, Threats, and Best Practices
Should you worry about mobile security? Discover...
Read More
What is Crimeware?
Worried about crimeware on your system or...
Read More
What is Blockchain Security?
If you’re a crypto-user or engaging with...
Read More
Current page, page 1
1
2
3
4
5
6