Skip to main content
SQL injection allows attackers to gain...
Read More
Heuristic analysis is a method of detecting...
Read More
Subcategory Web (Definitions)
Encryption is a practice of encoding data so that...
Read More
What is Linux and is it secure? Discover how the...
Read More
Not all hackers are malicious. Many companies...
Read More
Voice over IP (VoIP) is a communication...
Read More
Vishing is a verbal form of the practice commonly...
Read More
BitTorrent is a distributed protocol transfer...
Read More
Subcategory Web (Definitions)
Investors and journalists have likened the craze...
Read More
Learn about the Shylock Trojan and how you can...
Read More
Patch management is the strategy that dictates...
Read More
Subcategory Virus
A boot sector virus is a type of virus that...
Read More
Subcategory Virus
Industry definition for the term Web Filter. A...
Read More
Subcategory Virus
Industry definition for the term Stealth Virus. A...
Read More
Subcategory Virus
Industry definition for the term Metamorphic...
Read More
Subcategory Malicious Programs
Industry definition for the term Malicious Code....
Read More
Subcategory Virus
A macro virus adds their code to macros...
Read More
Subcategory Malware
The Koobface Virus is a worm that uses social...
Read More
Subcategory Malware
Bloatware is software that requires a large...
Read More
Subcategory Malware
The Clampi Virus is a man in the browser Trojan...
Read More
Imagine a threat that can adapt to every form of...
Read More
Subcategory Malware
A whaling attack is a method used by...
Read More
Wardriving involves searching for Wi-Fi networks...
Read More