Cybersecurity A-Z

Look up cybersecurity, computer, and other technical terms below. 

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A

Abandonware

Adware

Advanced Persistent Threat

Antivirus

Augmented reality (AR)

B

Backdoor

BlackMatter

Bloatware

Bot

Botnet

Brute force attack

Business email compromise (BEC)

C

Catphishing

Cloud computing

Computer cookies

Computer drivers

Computer virus

Computer worm

Conti ransomware

Cryptocurrency

Cryptojacking

CryptoLocker

Cyberbullying

D

Dark web

DarkSide ransomware

Data breach

DDoS

DNS hijacker

Doxxing

Dridex

E

EDR

Emotet

Encryption

Endpoint protection

EternalBlue

EternalChampion

EternalRomance

Exe file

Exploit

F

Facial recognition

File extensions

Fileless malware

G

GandCrab

H

Hacking

Hacktool

Hard drive

Have I Been Pwned (HIBP)

Heartbleed

Heuristic analysis

HiveNightmare

Honeypot

I

Identity theft

InfoStealer

Internet of Things (IoT)

Internet safety

Internet Service Provider (ISP)

IP address

J

Juice jacking

K

Keylogger

L

Local Area Network (LAN)

Locky

M

Malware

Malvertising

Man-in-the-Middle (MitM)

Maze ransomware

N

O

P

Pegasus spyware

Pharming

Phishing

Potentially Unwanted Program (PUP)

Private browsing

PYSA

Q

Qbot

R

RAM

Ransomware

Remediation

Remote Access Trojan (RAT)

REvil ransomware

Riskware

RMM software

Rootkit

Ryuk ransomware

S

SamSam ransomware

Scam call

Scareware

Signature

Smishing

Social engineering

Sodinokibi

Spam

Spear phishing

Spoofing

Spyware

SQL injection

SSD

SSL certificates

Stuxnet

Supply chain attack

T

Tech support scam

Threat actor

Tor (The Onion Router)

TrickBot

Trojan

Typosquatting

U

V

Virtual machine (VM)

Virtual reality (VR)

VPN

VPN protocol

W

WannaCry

Wide Area Network (WAN)

WiFi

WireGuard

X

XSS (Cross-site scripting)

Y

Z

ZeuS (Zbot Trojan)

Zero day

Zero trust

Back to top

Try Malwarebytes free

Try Malwarebytes protection free

Free trials

Select your language