Skip to main content

Glossary

A B C D F H I M P R S T V W All

This malicious software installs itself on the user's computer or network and encrypts or locks sensitive files. The attacker demands a ransom from the user to recover the files or system, setting a time limit. The softwares may enter via suspicious email attachments or downloaded files, or by exploiting vulnerabilities.

This software displays intrusive advertisements on the user's computer that can interfere with the browsing experience and also pose a security risk. It is usually bundled with free applications or installed as part of software downloaded from suspicious sources, often without the user's awareness. Some adware may behave aggressively, for example, redirecting the browser to suspicious sites or changing browser settings.

Rootkits are programs that run in the background and can cause damage to your computer without you noticing. These programs are usually hidden behind some system application or process, so they do not appear to change the way it works. Rootkits are capable of transmitting various data to external parties or even creating a backdoor that allows the attacker to freely enter and exit the victim's machine.