Skip to main content

Glossary

A B C D E F H I K M O P R S T U V W X All

Malicious browser extensions are malicious add-ons that install themselves in the user's browser to collect data, spy on the user or perform other harmful actions. These extensions often gain unauthorized access to a user's browsing history, passwords and other personal information.

They are often distributed for free or in the form of attractive offers, and users may not even suspect that the extension is harmful. It is advisable to download extensions only from trusted sources, read the reviews, and regularly check and remove unused or suspicious extensions from the browser.

Unsolicited e-mail (spam) that contains links or attachments to malicious content, such as viruses or malicious programs.

Any malicious software that is intentionally designed to steal data or damage computers or entire systems. Examples include viruses, Trojans, ransomware, etc.

A Man-in-the-Middle (MitM) attack is a cybersecurity threat where an attacker intrudes undetected into communications between two parties. This allows the attacker to access and modify transmitted data or even steal sensitive information while the communicating parties believe they are in secure communication.