Cybersecurity A-Z

Look up cybersecurity, computer, and other technical terms below. 

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A

Abandonware

Adware

Advanced Persistent Threat

Antivirus

Attack vector

Augmented reality (AR)

B

Backdoor

BlackMatter

Bloatware

Blue screen of death (BSOD)

Boot sector virus

Bot

Botnet

Brute force attack

Business email compromise (BEC)

C

Cache

Catphishing

Cloud computing

Computer cookies

Computer drivers

Computer virus

Computer worm

Conti ransomware

Cryptocurrency

Cryptojacking

CryptoLocker

Cyberbullying

D

Dark web

DarkSide ransomware

Data breach

DDoS

Deepfake

DNS hijacker

Doxxing

Dridex

Drive-by download

E

EDR

Emotet

Encryption

Endpoint protection

EternalBlue

EternalChampion

EternalRomance

Exe file

Exploit

F

Facial recognition

File extensions

Fileless malware

G

GandCrab

H

Hacking

Hacktivist

Hacktool

Hard drive

Have I Been Pwned (HIBP)

Heartbleed

Heuristic analysis

HiveNightmare

Honeypot

I

Identity fraud

Identity theft

InfoStealer

Internet of Things (IoT)

Internet safety

Internet Service Provider (ISP)

IP address

J

Juice jacking

K

Keylogger

L

Local Area Network (LAN)

Locky

M

Macro virus

Malware

Malvertising

Man-in-the-Middle (MitM)

Maze ransomware

Modem

N

NFT

O

P

Passkey

Password generator

Pegasus spyware

PII

Pharming

Phishing

Phishing email

Potentially Unwanted Program (PUP)

Private browsing

Proxy

PYSA

Q

Qbot

Quishing

R

RAM

Ransomware

Remediation

Remote Access Trojan (RAT)

REvil ransomware

Riskware

RMM software

Rootkit

Router

Ryuk ransomware

S

SamSam ransomware

Scam call

Scareware

Search engine

Signature

Smishing

Social engineering

Sodinokibi

Spam

Spear phishing

Spoofing

Spyware

SQL injection

SSD

SSL certificates

Stalkerware

Stuxnet

Supply chain attack

Swatting

T

Tech support scam

Threat actor

Tor (The Onion Router)

TrickBot

Trojan

Twitch

Typosquatting

U

V

Virtual machine (VM)

Virtual reality (VR)

Vishing

VPN

VPN protocol

W

WannaCry

Watering hole attack

Whaling attack (whale phishing)

Wide Area Network (WAN)

WiFi

WireGuard

X

XSS (Cross-site scripting)

Y

Z

Zbot

ZeuS Trojan

Zero day

Zero trust

Back to top