Adware is software that displays advertisements on your computer.
Anonymizing Proxies allow the user to hide their web browsing activity. They are often used to bypass web security filters-e.g. to access blocked sites from a work computer.
Advanced Persistent Threat (APT)
Advanced persistent threats are a type of targeted attack. APT are characterized by an attacker who has time and resources to plan an infiltration in to a network.
Autorun worms are malicious programs that take advantage of the windows autorun feature. They execute automatically when the device on which they are stored is plugged into a computer
Boot Sector malware
Boot sector malware spreads by modifying the program that enables your computer to start up.
A Backdoor Trojan allows someone to take control of user’s computer via the internet without their permission
A botnet is a collection of infected computers that are remotely controlled by a hacker.
Browser hijackers change the default homepage and search engine in your internet browser without your permission.
Brute force attack
A brute force attack is one in which hackers try a large no. of possible keyword or password combinations to gain unauthorized access to a system or file.
A buffer overflow occurs when a program stores excess data by overwriting other parts of the computer’s memory, causing errors or crashes.
An electronic chain letter is an email that urges you to forward copies to other people.
Cookies are files placed on your computer that allow websites to remember details.
Command and control center
A command and control center (C & C) is a computer that controls botnet (i.e. a networks of compromised or zombie computers). Some botnets use distributed command and control systems, making them more resilient.
Data Loss is the result of the accidental misplacement of data, rather than its deliberate theft.
Data theft is the deliberate theft of information rather than its accidental loss.
Data leakage is the unauthorized movement of information, usually outside an organization. It can be deliberate (Data Theft) or accidental (Data Loss).
Document malware takes advantage of embedded script or macro content in document files.
Denial of service attack
A Denial of Service (DOS) attack prevents users from accessing a computer or website.
The Domain Name System (DNS) is the phone book of the internet. It allows computers to translate website names, like www.sophos.com into IP address numbers so that they can communicate with each other
A drive-by download is the infection of the computer with malware when a user visits a malicious website
Email malware refers to malware that is distributed via email
An exploit takes advantage of a vulnerability in order to access or infect a computer.
Fake antivirus malware
Fake antivirus malware reports non-existent threats in order to scare the user into paying for unnecessary product registration and clean-up.
A honeypot is a form of trap security specialists use to detect hacking attacks or collect malware samples
Hacktivism typically hacks for political purposes, attacking corporations, governments, organizations, and individuals.
Hoaxes are reports of non-existent viruses or threats.
Worms are viruses that create copies of themselves across the internet or local networks.
In-the-cloud detection uses real-time online checking of data in order to detect threats.
Keylogging is when keystrokes are secretly recorded by an unauthorized third party.
Malware is a general term for malicious software including viruses, worms, Trojans, and spyware. Many people use the terms malware and viruses interchangeably.
Non-compliance is the failure to comply with government or industry regulations regarding data privacy and security.
Parasitic viruses, also known as file viruses, spread by attaching themselves to programs.
Patches are software add-ons designed to fix software bugs, including security, in operating systems or applications.
Phishing refers to the process of tricking recipients into sharing sensitive information with an unknown third party.
Potentially unwanted application (PUA)
Potentially unwanted applications are programs that are not malicious but may be unsuitable for use in a business environment.
A rootkit is a piece of software that hides programs or processes running on a computer. It can be used to conceal computer misuse or data theft.
Social engineering refers to the methods attackers use to deceive victims into performing an action. Typically, these actions are opening a methodsalicious webpage or running an unwanted file attachment.
Social networking websites allow you to communicate and share information. But they can also be used to spread malware and to steal personal information
Spam is unsolicited bulk email, the electronic equivalent of junk mail that comes to your inbox.
Email spoofing is when the sender address of an email is forged for the purposes of social engineering.
Spearphishing is targeted phishing using spoof emails to persuade people within a company to reveal sensitive information or credentials.
Spyware is software that permits advertisers or hackers to gather sensitive information without your permission.
Suspicious files and behavior
When an endpoint security solution scans files, it labels them as clean or malicious. If a file has a number of questionable characteristics or behavior, it is labeled as suspicious.
SQL injection is an exploit that takes advantage of database query software that doesn’t thoroughly test fort correct queries.
Trojan (Trojan horse)
Trojans are programs that pretend to be a legitimate software but actually carry out hidden, harmful functions.
Viruses are computer programs that can spread by making copies of themselves.
Vulnerabilities are bugs in software programs that hackers exploit to infect computers.
A Zombie is an infected computer that is remotely controlled by a hacker. It is often part of a botnet, which is a network of many zombies or bot computers.