Skip to main content
Kaspersky logo
Home
Kaspersky Premium
Kaspersky Plus
Kaspersky Standard
Kaspersky Safe Kids
Kaspersky Password Manager
Renew License
Support
Trials & Downloads
Business
KSOS Portal
Trials & Downloads
Renew SMB license
Find a partner
Company Account
Kaspersky TIP
Support
Cloud Console
Partners
Providers for business
Consumer solutions providers
Partnership with distributors
Find a learning center
Kaspersky United Partner Portal
Become a B2B partner
Become a Build partner
Become a B2C partner
Allowlist Program
About us
Get to know us
Transparency
Corporate News
Press center
Kaspersky Academy
Expertise Centers
Awards & Recognitions
Top 3 Rankings
Sponsorships
Case Studies
Policy blog
Careers
Contact us
Home
Business
Partners
About us
My Account
Americas
América Latina
Brasil
United States
Canada - English
Canada - Français
Africa
Afrique Francophone
Algérie
Maroc
South Africa
Tunisie
Middle East
Middle East (English)
الشرق الأوسط (Arabic)
Western Europe
Belgique & Luxembourg
Danmark
Deutschland & Schweiz
España
France
Italia & Svizzera
Nederland
Norge
Österreich
Portugal
Sverige
Suomi
United Kingdom
Eastern Europe
Česká republika
Magyarország
Polska
România
Srbija
Türkiye
Ελλάδα (Greece)
България (Bulgaria)
Қазақстан - Русский (Kazakhstan - Russian)
Қазақстан - Қазақша (Kazakhstan - Kazakh)
Россия и Белару́сь (Russia & Belarus)
Україна (Ukraine)
Asia & Pacific
Australia
India
Indonesia (Bahasa)
Malaysia - English
Malaysia - Bahasa Melayu
New Zealand
Việt Nam
ไทย (Thailand)
한국 (Korea)
中国 (China)
香港特別行政區 (Hong Kong SAR)
台灣 (Taiwan)
日本語 (Japan)
For all other countries
Global Website
Home
Home Products
Resource Center
Definitions
Pre-emptive Safety
Threats
Definitions
Definitions
Educate yourself on the terminology used for online security threats, including definitions and descriptions for malware, viruses, and more.
Filter by:
Filter by:
Malicious Programs
Malware
Spam and Phishing
Threats (Definitions)
Virus
Web (Definitions)
What is Linux and is it really secure?
What is Linux and is it secure? Discover how the...
READ MORE
White Hat Hackers: The Good, the Bad, or the Ugly?
Not all hackers are malicious. Many companies...
READ MORE
What Is Voice Over IP (VoIP)?
Voice over IP (VoIP) is a communication...
READ MORE
What Is Vishing?
Vishing is a verbal form of the practice commonly...
READ MORE
What Is BitTorrent and Is It Safe?
BitTorrent is a distributed protocol transfer...
READ MORE
WEB (DEFINITIONS)
Subcategory Web (Definitions)
What Is Bitcoin?
Investors and journalists have likened the craze...
READ MORE
Everything You Need to Know About the Shylock Banking Trojan
Learn about the Shylock Trojan and how you can...
READ MORE
What Is a Replay Attack?
Patch management is the strategy that dictates...
READ MORE
MALWARE
Subcategory Malware
What Is the Koobface Virus?
The Koobface Virus is a worm that uses social...
READ MORE
MALWARE
Subcategory Malware
What is Bloatware and How Do You Remove It?
Bloatware is software that requires a large...
READ MORE
MALWARE
Subcategory Malware
What is the Clampi Virus?
The Clampi Virus is a man in the browser Trojan...
READ MORE
What is the Polymorphic Virus?
Imagine a threat that can adapt to every form of...
READ MORE
MALWARE
Subcategory Malware
What is a Whaling Attack?
A whaling attack is a method used by...
READ MORE
What is wardriving? Definition and explanation
Wardriving involves searching for Wi-Fi networks...
READ MORE
WEB (DEFINITIONS)
Subcategory Web (Definitions)
What is Unified Threat Management (UTM)?
Industry definition for the term Unified Threat...
READ MORE
WEB (DEFINITIONS)
Subcategory Web (Definitions)
What is a Tunneling Protocol?
Industry definition for the term Tunneling...
READ MORE
VIRUS
Subcategory Virus
What is a Web Filter?
Industry definition for the term Web Filter. A...
READ MORE
What is Macro Virus? - Definition
Industry definition for the term Macro Virus. A...
READ MORE
What is scareware? Definition and explanation
Scareware is malicious software that tricks users...
READ MORE
SPAM AND PHISHING
Subcategory Spam and Phishing
What Is Pharming and How to Protect Yourself
What is pharming? And how do you protect yourself...
READ MORE
MALWARE
Subcategory Malware
What is Ezula?
Industry definition for the term Ezula. Ezula...
READ MORE
MALICIOUS PROGRAMS
Subcategory Malicious Programs
What is Beta Bot?
Industry definition for the term Beta Bot. Beta...
READ MORE
Stuxnet explained: What it is, who created it and how it works
What is Stuxnet and why is it significant to...
READ MORE
What is a Smurf Attack?
Industry definition for the term Smurf Attack. A...
READ MORE
Current page, page 1
1
2
3
4
5
6