Skip to main content
Kaspersky logo
Home
Kaspersky Premium
Kaspersky Plus
Kaspersky Standard
Kaspersky Safe Kids
Kaspersky Password Manager
Renew License
Support
Trials & Downloads
Business
KSOS Portal
Trials & Downloads
Renew SMB license
Find a partner
Company Account
Kaspersky TIP
Support
Cloud Console
Partners
Providers for business
Consumer solutions providers
Partnership with distributors
Find a learning center
Kaspersky United Partner Portal
Become a B2B partner
Become a Build partner
Become a B2C partner
Allowlist Program
About us
Get to know us
Transparency
Corporate News
Press center
Kaspersky Academy
Expertise Centers
Awards & Recognitions
Top 3 Rankings
Sponsorships
Security Bulletin
Case Studies
Policy blog
Careers
Contact us
Home
Business
Partners
About us
My Account
Americas
América Latina
Brasil
United States
Canada - English
Canada - Français
Africa
Afrique Francophone
Maroc
South Africa
Tunisie
Middle East
Middle East (English)
الشرق الأوسط (Arabic)
Western Europe
Belgique & Luxembourg
Danmark
Deutschland & Schweiz
España
France
Italia & Svizzera
Nederland
Norge
Österreich
Portugal
Sverige
Suomi
United Kingdom
Eastern Europe
Česká republika
Magyarország
Polska
România
Srbija
Türkiye
Ελλάδα (Greece)
България (Bulgaria)
Қазақстан - Русский (Kazakhstan - Russian)
Қазақстан - Қазақша (Kazakhstan - Kazakh)
Россия и Белару́сь (Russia & Belarus)
Україна (Ukraine)
Asia & Pacific
Australia
India
Indonesia (Bahasa)
Malaysia - English
Malaysia - Bahasa Melayu
New Zealand
Việt Nam
ไทย (Thailand)
한국 (Korea)
中国 (China)
香港特別行政區 (Hong Kong SAR)
台灣 (Taiwan)
日本語 (Japan)
For all other countries
Global Website
Home
Home Products
Resource Center
Definitions
Pre-emptive Safety
Threats
Definitions
Definitions
Educate yourself on the terminology used for online security threats, including definitions and descriptions for malware, viruses, and more.
Filter by:
Filter by:
Malicious Programs
Malware
Spam and Phishing
Threats (Definitions)
Virus
Web (Definitions)
CL0P Ransomware: What is it and how does it work?
Minimize the threat of cl0p ransomware by...
READ MORE
What is Managed Detection and Response (MDR)?
More businesses are turning to MDR, meaning...
READ MORE
How to Hide My Email: What is Email Masking?
Wondering how to hide your email for better...
READ MORE
What is Stalkerware? How to Find and Remove Stalkerware
Wondering how someone can track your phone? Learn...
READ MORE
Data Leakage: How to Prevent Data Breaches?
Data leakage is a common issue, especially for...
READ MORE
Crypto Wallet Hardware: Hardware Wallet vs Cold Wallets
Crypto wallet hardware and hot wallets are...
READ MORE
What is security awareness training?
Security awareness training is an important line...
READ MORE
What is ransomware as a service?
Ransomware as a service has made this particular...
READ MORE
Tor Browser: What is it and is it safe?
The Tor browser has become popular due to the...
READ MORE
What is a Dictionary Attack?
Dictionary attacks are a common cybercrime which...
READ MORE
What is password spraying? How to prevent password spraying attacks
Password spraying is a type of brute force attack...
READ MORE
What is a Password Vault & What is their Purpose?
Learn what a password vault is, how it’s used &...
READ MORE
What is a crypto wallet and how to protect it
A crypto wallet stores public & private keys for...
READ MORE
What is a Hardware Wallet & How Does it Work?
A hardware wallet is one of the best ways to...
READ MORE
What is a Business VPN & How Do they Work?
Wondering if your enterprise may benefit from a...
READ MORE
What is session hijacking and how does it work?
READ MORE
What is DNS hijacking?
Need to know what a DNS hijack attack is, how you...
READ MORE
What is an SSID?
Wondering what an SSID is? Learn what the term...
READ MORE
What is steganography? Definition and explanation
You can hide secret messages in plain sight. But...
READ MORE
What is browser isolation and how does it work?
Discover how isolating browsing activity helps to...
READ MORE
What is cryptocurrency and how does it work?
Cryptocurrency is a digital currency using...
READ MORE
What is extended detection and response (XDR)?
What is XDR? XDR stands for extended detection &...
READ MORE
What are NFTs and how do they work?
Non-Fungible Tokens have taken the digital art...
READ MORE
What is hacking? And how to prevent it
Hacking is the act of gaining unauthorized access...
READ MORE
Current page, page 1
1
2
3
4
5
6