Skip to main content
Kaspersky logo
Home
Kaspersky Premium
Kaspersky Plus
Kaspersky Standard
Kaspersky Safe Kids
Kaspersky VPN Secure Connection
Kaspersky Password Manager
Renew License
Support
Trials & Downloads
Student discounts
Business
KSOS Portal
Trials & Downloads
Renew SMB license
Find a partner
Company Account
Kaspersky TIP
Support
Cloud Console
Partners
Providers for business
Consumer solutions providers
Partnership with distributors
Find a learning center
Kaspersky United Partner Portal
Become a B2B partner
Become a Build partner
Become a B2C partner
Allowlist Program
About us
Get to know us
Transparency
Corporate News
Press center
Kaspersky Academy
Expertise Centers
Awards & Recognitions
Top 3 Rankings
Sponsorships
Security Bulletin
Case Studies
Policy blog
Careers
Contact us
Home
Business
Partners
About us
My Account
Americas
América Latina
Brasil
United States
Canada - English
Canada - Français
Africa
Afrique Francophone
Maroc
South Africa
Tunisie
Middle East
Middle East (English)
الشرق الأوسط (Arabic)
Western Europe
Belgique & Luxembourg
Danmark
Deutschland & Schweiz
España
France
Italia & Svizzera
Nederland
Norge
Österreich
Portugal
Sverige
Suomi
United Kingdom
Eastern Europe
Česká republika
Magyarország
Polska
România
Srbija
Türkiye
Ελλάδα (Greece)
България (Bulgaria)
Қазақстан - Русский (Kazakhstan - Russian)
Қазақстан - Қазақша (Kazakhstan - Kazakh)
Россия и Белару́сь (Russia & Belarus)
Україна (Ukraine)
Asia & Pacific
Australia
India
Indonesia (Bahasa)
Malaysia - English
Malaysia - Bahasa Melayu
New Zealand
Việt Nam
ไทย (Thailand)
한국 (Korea)
中国 (China)
香港特別行政區 (Hong Kong SAR)
台灣 (Taiwan)
日本語 (Japan)
For all other countries
Global Website
Home
Resource Center
Definitions
Pre-emptive Safety
Threats
Definitions
Definitions
Educate yourself on the terminology used for online security threats, including definitions and descriptions for malware, viruses, and more.
Filter by:
Filter by:
Malicious Programs
Malware
Spam and Phishing
Threats (Definitions)
Virus
Web (Definitions)
What is browser isolation and how does it work?
Discover how isolating browsing activity helps to...
READ MORE
What is extended detection and response (XDR)?
What is XDR? XDR stands for extended detection &...
READ MORE
What are NFTs and how do they work?
Non-Fungible Tokens have taken the digital art...
READ MORE
What is hacking? And how to prevent it
Hacking is the act of gaining unauthorized access...
READ MORE
What is Zero Trust Security? Key Benefits and How It Works
Zero Trust security protects against cyber...
READ MORE
What Is Endpoint Security and How Does It Work?
Endpoint security involves protecting endpoints –...
READ MORE
What is a PUP?
What is a potentially unwanted program (PUP) and...
READ MORE
What is zero-click malware, and how do zero-click attacks work?
Zero-click spyware is a malicious hack that...
READ MORE
MALICIOUS PROGRAMS
Subcategory Malicious Programs
What is a digital footprint? And how to protect it from hackers
A digital footprint is the trail of data you...
READ MORE
MALICIOUS PROGRAMS
Subcategory Malicious Programs
WEP, WPA, WPA2 and WPA3: Differences and explanation
Wireless security is essential to staying safe...
READ MORE
MALICIOUS PROGRAMS
Subcategory Malicious Programs
What is a Zero-day Attack? - Definition and Explanation
What is zero-day & what are zero-day...
READ MORE
Internet security: What is it, and how can you protect yourself online?
Internet security refers to staying safe when...
READ MORE
What is Rootkit – Definition and Explanation
What is rootkit? Rootkit malware gives hackers...
READ MORE
What is maze ransomware? Definition and explanation
What is maze ransomware? Maze malware extorts...
READ MORE
What are robocalls, and how can you stop them?
What are robocalls? Robocalls can be a nuisance...
READ MORE
Black hat, White hat, and Gray hat hackers – Definition and Explanation
Hackers generally come in three forms: Black hat,...
READ MORE
What is Typosquatting? – Definition and Explanation
Typosquatting, also known as URL hijacking, is a...
READ MORE
What is Cryptojacking and how does it work?
Cryptojacking is where cybercriminals secretly...
READ MORE
What is a cross-site scripting attack? Definition and explanation
What is cross-site scripting? Learn about...
READ MORE
What are bots? – Definition and Explanation
What is a computer bot? An internet bot or web...
READ MORE
WEB (DEFINITIONS)
Subcategory Web (Definitions)
What is a VPN? How It Works, Types, and Benefits
How do VPNs work, are they secure and legal to...
READ MORE
VIRUS
Subcategory Virus
What is a Boot Sector Virus? - Definition
A boot sector virus is a type of virus that...
READ MORE
WEB (DEFINITIONS)
Subcategory Web (Definitions)
What is Cryptography?
Cryptography is a key part of cybersecurity....
READ MORE
WEB (DEFINITIONS)
Subcategory Web (Definitions)
What is an SSL certificate – Definition and Explanation
READ MORE
Current page, page 1
1
2
3
4
5
6