Skip to main content

Glossary

A B C D F H I M P R S T V W All

This malicious software installs itself on the user's computer or network and encrypts or locks sensitive files. The attacker demands a ransom from the user to recover the files or system, setting a time limit. The softwares may enter via suspicious email attachments or downloaded files, or by exploiting vulnerabilities.

Rootkits are programs that run in the background and can cause damage to your computer without you noticing. These programs are usually hidden behind some system application or process, so they do not appear to change the way it works. Rootkits are capable of transmitting various data to external parties or even creating a backdoor that allows the attacker to freely enter and exit the victim's machine.