Cybersecurity A-Z Look up cybersecurity, computer, and other technical terms below. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A Abandonware Adware Advanced Persistent Threat Antivirus Attack vector Augmented reality (AR) B Backdoor BlackMatter Bloatware Blue screen of death (BSOD) Boot sector virus Bot Botnet Brute force attack Business email compromise (BEC) C Cache Catphishing Cloud computing Computer cookies Computer drivers Computer virus Computer worm Conti ransomware Cryptocurrency Cryptojacking CryptoLocker Cyberbullying D Dark web DarkSide ransomware Data breach DDoS Deepfake DNS hijacker Doxxing Dridex Drive-by download E EDR Emotet Encryption Endpoint protection EternalBlue EternalChampion EternalRomance Exe file Exploit F Facial recognition File extensions Fileless malware G GandCrab H Hacking Hacktivist Hacktool Hard drive Have I Been Pwned (HIBP) Heartbleed Heuristic analysis HiveNightmare Honeypot I Identity fraud Identity theft InfoStealer Internet of Things (IoT) Internet safety Internet Service Provider (ISP) IP address J Juice jacking K Keylogger L Local Area Network (LAN) Locky M Macro virus Malware Malvertising Man-in-the-Middle (MitM) Maze ransomware Modem N NFT O P Passkey Password generator Pegasus spyware PII Pharming Phishing Phishing email Potentially Unwanted Program (PUP) Private browsing Proxy PYSA Q Qbot Quishing R RAM Ransomware Remediation Remote Access Trojan (RAT) REvil ransomware Riskware RMM software Rootkit Router Ryuk ransomware S SamSam ransomware Scam call Scareware Search engine Signature Smishing Social engineering Sodinokibi Spam Spear phishing Spoofing Spyware SQL injection SSD SSL certificates Stalkerware Stuxnet Supply chain attack Swatting T Tech support scam Threat actor Tor (The Onion Router) TrickBot Trojan Twitch Typosquatting U V Virtual machine (VM) Virtual reality (VR) Vishing VPN VPN protocol W WannaCry Watering hole attack Whaling attack (whale phishing) Wide Area Network (WAN) WiFi WireGuard X XSS (Cross-site scripting) Y Z Zbot ZeuS Trojan Zero day Zero trust Back to top