CINXE.COM

Glossary | Malwarebytes

<!doctype html> <html lang="en"> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <meta charset="UTF-8"><script type="text/javascript">(window.NREUM||(NREUM={})).init={privacy:{cookies_enabled:true},ajax:{deny_list:["bam.nr-data.net"]}};(window.NREUM||(NREUM={})).loader_config={licenseKey:"NRJS-51878192dd15f231213",applicationID:"732197726"};;/*! For license information please see nr-loader-rum-1.274.0.min.js.LICENSE.txt */ (()=>{var e,t,r={8122:(e,t,r)=>{"use strict";r.d(t,{a:()=>i});var n=r(944);function i(e,t){try{if(!e||"object"!=typeof e)return(0,n.R)(3);if(!t||"object"!=typeof t)return(0,n.R)(4);const r=Object.create(Object.getPrototypeOf(t),Object.getOwnPropertyDescriptors(t)),o=0===Object.keys(r).length?e:r;for(let a in o)if(void 0!==e[a])try{if(null===e[a]){r[a]=null;continue}Array.isArray(e[a])&&Array.isArray(t[a])?r[a]=Array.from(new Set([...e[a],...t[a]])):"object"==typeof e[a]&&"object"==typeof t[a]?r[a]=i(e[a],t[a]):r[a]=e[a]}catch(e){(0,n.R)(1,e)}return r}catch(e){(0,n.R)(2,e)}}},2555:(e,t,r)=>{"use strict";r.d(t,{Vp:()=>c,fn:()=>s,x1:()=>u});var n=r(384),i=r(8122);const o={beacon:n.NT.beacon,errorBeacon:n.NT.errorBeacon,licenseKey:void 0,applicationID:void 0,sa:void 0,queueTime:void 0,applicationTime:void 0,ttGuid:void 0,user:void 0,account:void 0,product:void 0,extra:void 0,jsAttributes:{},userAttributes:void 0,atts:void 0,transactionName:void 0,tNamePlain:void 0},a={};function s(e){try{const t=c(e);return!!t.licenseKey&&!!t.errorBeacon&&!!t.applicationID}catch(e){return!1}}function c(e){if(!e)throw new Error("All info objects require an agent identifier!");if(!a[e])throw new Error("Info for ".concat(e," was never set"));return a[e]}function u(e,t){if(!e)throw new Error("All info objects require an agent identifier!");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r&&(r.info=a[e])}},9417:(e,t,r)=>{"use strict";r.d(t,{D0:()=>g,gD:()=>h,xN:()=>p});var n=r(993);const i=e=>{if(!e||"string"!=typeof e)return!1;try{document.createDocumentFragment().querySelector(e)}catch{return!1}return!0};var o=r(2614),a=r(944),s=r(384),c=r(8122);const u="[data-nr-mask]",d=()=>{const e={mask_selector:"*",block_selector:"[data-nr-block]",mask_input_options:{color:!1,date:!1,"datetime-local":!1,email:!1,month:!1,number:!1,range:!1,search:!1,tel:!1,text:!1,time:!1,url:!1,week:!1,textarea:!1,select:!1,password:!0}};return{ajax:{deny_list:void 0,block_internal:!0,enabled:!0,harvestTimeSeconds:10,autoStart:!0},distributed_tracing:{enabled:void 0,exclude_newrelic_header:void 0,cors_use_newrelic_header:void 0,cors_use_tracecontext_headers:void 0,allowed_origins:void 0},feature_flags:[],generic_events:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},harvest:{tooManyRequestsDelay:60},jserrors:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},logging:{enabled:!0,harvestTimeSeconds:10,autoStart:!0,level:n.p_.INFO},metrics:{enabled:!0,autoStart:!0},obfuscate:void 0,page_action:{enabled:!0},page_view_event:{enabled:!0,autoStart:!0},page_view_timing:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},performance:{capture_marks:!1,capture_measures:!1},privacy:{cookies_enabled:!0},proxy:{assets:void 0,beacon:void 0},session:{expiresMs:o.wk,inactiveMs:o.BB},session_replay:{autoStart:!0,enabled:!1,harvestTimeSeconds:60,preload:!1,sampling_rate:10,error_sampling_rate:100,collect_fonts:!1,inline_images:!1,fix_stylesheets:!0,mask_all_inputs:!0,get mask_text_selector(){return e.mask_selector},set mask_text_selector(t){i(t)?e.mask_selector="".concat(t,",").concat(u):""===t||null===t?e.mask_selector=u:(0,a.R)(5,t)},get block_class(){return"nr-block"},get ignore_class(){return"nr-ignore"},get mask_text_class(){return"nr-mask"},get block_selector(){return e.block_selector},set block_selector(t){i(t)?e.block_selector+=",".concat(t):""!==t&&(0,a.R)(6,t)},get mask_input_options(){return e.mask_input_options},set mask_input_options(t){t&&"object"==typeof t?e.mask_input_options={...t,password:!0}:(0,a.R)(7,t)}},session_trace:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},soft_navigations:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},spa:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},ssl:void 0,user_actions:{enabled:!0}}},l={},f="All configuration objects require an agent identifier!";function g(e){if(!e)throw new Error(f);if(!l[e])throw new Error("Configuration for ".concat(e," was never set"));return l[e]}function p(e,t){if(!e)throw new Error(f);l[e]=(0,c.a)(t,d());const r=(0,s.nY)(e);r&&(r.init=l[e])}function h(e,t){if(!e)throw new Error(f);var r=g(e);if(r){for(var n=t.split("."),i=0;i<n.length-1;i++)if("object"!=typeof(r=r[n[i]]))return;r=r[n[n.length-1]]}return r}},3371:(e,t,r)=>{"use strict";r.d(t,{V:()=>f,f:()=>l});var n=r(8122),i=r(384),o=r(6154),a=r(9324);let s=0;const c={buildEnv:a.F3,distMethod:a.Xs,version:a.xv,originTime:o.WN},u={customTransaction:void 0,disabled:!1,isolatedBacklog:!1,loaderType:void 0,maxBytes:3e4,onerror:void 0,ptid:void 0,releaseIds:{},appMetadata:{},session:void 0,denyList:void 0,timeKeeper:void 0,obfuscator:void 0},d={};function l(e){if(!e)throw new Error("All runtime objects require an agent identifier!");if(!d[e])throw new Error("Runtime for ".concat(e," was never set"));return d[e]}function f(e,t){if(!e)throw new Error("All runtime objects require an agent identifier!");d[e]={...(0,n.a)(t,u),...c},Object.hasOwnProperty.call(d[e],"harvestCount")||Object.defineProperty(d[e],"harvestCount",{get:()=>++s});const r=(0,i.nY)(e);r&&(r.runtime=d[e])}},9324:(e,t,r)=>{"use strict";r.d(t,{F3:()=>i,Xs:()=>o,xv:()=>n});const n="1.274.0",i="PROD",o="CDN"},6154:(e,t,r)=>{"use strict";r.d(t,{OF:()=>c,RI:()=>i,WN:()=>d,bv:()=>o,gm:()=>a,mw:()=>s,sb:()=>u});var n=r(1863);const i="undefined"!=typeof window&&!!window.document,o="undefined"!=typeof WorkerGlobalScope&&("undefined"!=typeof self&&self instanceof WorkerGlobalScope&&self.navigator instanceof WorkerNavigator||"undefined"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis.navigator instanceof WorkerNavigator),a=i?window:"undefined"!=typeof WorkerGlobalScope&&("undefined"!=typeof self&&self instanceof WorkerGlobalScope&&self||"undefined"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis),s=Boolean("hidden"===a?.document?.visibilityState),c=/iPad|iPhone|iPod/.test(a.navigator?.userAgent),u=c&&"undefined"==typeof SharedWorker,d=((()=>{const e=a.navigator?.userAgent?.match(/Firefox[/\s](\d+\.\d+)/);Array.isArray(e)&&e.length>=2&&e[1]})(),Date.now()-(0,n.t)())},1687:(e,t,r)=>{"use strict";r.d(t,{Ak:()=>c,Ze:()=>l,x3:()=>u});var n=r(7836),i=r(3606),o=r(860),a=r(2646);const s={};function c(e,t){const r={staged:!1,priority:o.P3[t]||0};d(e),s[e].get(t)||s[e].set(t,r)}function u(e,t){e&&s[e]&&(s[e].get(t)&&s[e].delete(t),g(e,t,!1),s[e].size&&f(e))}function d(e){if(!e)throw new Error("agentIdentifier required");s[e]||(s[e]=new Map)}function l(e="",t="feature",r=!1){if(d(e),!e||!s[e].get(t)||r)return g(e,t);s[e].get(t).staged=!0,f(e)}function f(e){const t=Array.from(s[e]);t.every((([e,t])=>t.staged))&&(t.sort(((e,t)=>e[1].priority-t[1].priority)),t.forEach((([t])=>{s[e].delete(t),g(e,t)})))}function g(e,t,r=!0){const o=e?n.ee.get(e):n.ee,s=i.i.handlers;if(!o.aborted&&o.backlog&&s){if(r){const e=o.backlog[t],r=s[t];if(r){for(let t=0;e&&t<e.length;++t)p(e[t],r);Object.entries(r).forEach((([e,t])=>{Object.values(t||{}).forEach((t=>{t[0]?.on&&t[0]?.context()instanceof a.y&&t[0].on(e,t[1])}))}))}}o.isolatedBacklog||delete s[t],o.backlog[t]=null,o.emit("drain-"+t,[])}}function p(e,t){var r=e[1];Object.values(t[r]||{}).forEach((t=>{var r=e[0];if(t[0]===r){var n=t[1],i=e[3],o=e[2];n.apply(i,o)}}))}},7836:(e,t,r)=>{"use strict";r.d(t,{P:()=>c,ee:()=>u});var n=r(384),i=r(8990),o=r(3371),a=r(2646),s=r(5607);const c="nr@context:".concat(s.W),u=function e(t,r){var n={},s={},d={},l=!1;try{l=16===r.length&&(0,o.f)(r).isolatedBacklog}catch(e){}var f={on:p,addEventListener:p,removeEventListener:function(e,t){var r=n[e];if(!r)return;for(var i=0;i<r.length;i++)r[i]===t&&r.splice(i,1)},emit:function(e,r,n,i,o){!1!==o&&(o=!0);if(u.aborted&&!i)return;t&&o&&t.emit(e,r,n);for(var a=g(n),c=h(e),d=c.length,l=0;l<d;l++)c[l].apply(a,r);var p=m()[s[e]];p&&p.push([f,e,r,a]);return a},get:v,listeners:h,context:g,buffer:function(e,t){const r=m();if(t=t||"feature",f.aborted)return;Object.entries(e||{}).forEach((([e,n])=>{s[n]=t,t in r||(r[t]=[])}))},abort:function(){f._aborted=!0,Object.keys(f.backlog).forEach((e=>{delete f.backlog[e]}))},isBuffering:function(e){return!!m()[s[e]]},debugId:r,backlog:l?{}:t&&"object"==typeof t.backlog?t.backlog:{},isolatedBacklog:l};return Object.defineProperty(f,"aborted",{get:()=>{let e=f._aborted||!1;return e||(t&&(e=t.aborted),e)}}),f;function g(e){return e&&e instanceof a.y?e:e?(0,i.I)(e,c,(()=>new a.y(c))):new a.y(c)}function p(e,t){n[e]=h(e).concat(t)}function h(e){return n[e]||[]}function v(t){return d[t]=d[t]||e(f,t)}function m(){return f.backlog}}(void 0,"globalEE"),d=(0,n.Zm)();d.ee||(d.ee=u)},2646:(e,t,r)=>{"use strict";r.d(t,{y:()=>n});class n{constructor(e){this.contextId=e}}},9908:(e,t,r)=>{"use strict";r.d(t,{d:()=>n,p:()=>i});var n=r(7836).ee.get("handle");function i(e,t,r,i,o){o?(o.buffer([e],i),o.emit(e,t,r)):(n.buffer([e],i),n.emit(e,t,r))}},3606:(e,t,r)=>{"use strict";r.d(t,{i:()=>o});var n=r(9908);o.on=a;var i=o.handlers={};function o(e,t,r,o){a(o||n.d,i,e,t,r)}function a(e,t,r,i,o){o||(o="feature"),e||(e=n.d);var a=t[o]=t[o]||{};(a[r]=a[r]||[]).push([e,i])}},3878:(e,t,r)=>{"use strict";function n(e,t){return{capture:e,passive:!1,signal:t}}function i(e,t,r=!1,i){window.addEventListener(e,t,n(r,i))}function o(e,t,r=!1,i){document.addEventListener(e,t,n(r,i))}r.d(t,{DD:()=>o,jT:()=>n,sp:()=>i})},5607:(e,t,r)=>{"use strict";r.d(t,{W:()=>n});const n=(0,r(9566).bz)()},9566:(e,t,r)=>{"use strict";r.d(t,{LA:()=>s,bz:()=>a});var n=r(6154);const i="xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx";function o(e,t){return e?15&e[t]:16*Math.random()|0}function a(){const e=n.gm?.crypto||n.gm?.msCrypto;let t,r=0;return e&&e.getRandomValues&&(t=e.getRandomValues(new Uint8Array(30))),i.split("").map((e=>"x"===e?o(t,r++).toString(16):"y"===e?(3&o()|8).toString(16):e)).join("")}function s(e){const t=n.gm?.crypto||n.gm?.msCrypto;let r,i=0;t&&t.getRandomValues&&(r=t.getRandomValues(new Uint8Array(e)));const a=[];for(var s=0;s<e;s++)a.push(o(r,i++).toString(16));return a.join("")}},2614:(e,t,r)=>{"use strict";r.d(t,{BB:()=>a,H3:()=>n,g:()=>u,iL:()=>c,tS:()=>s,uh:()=>i,wk:()=>o});const n="NRBA",i="SESSION",o=144e5,a=18e5,s={STARTED:"session-started",PAUSE:"session-pause",RESET:"session-reset",RESUME:"session-resume",UPDATE:"session-update"},c={SAME_TAB:"same-tab",CROSS_TAB:"cross-tab"},u={OFF:0,FULL:1,ERROR:2}},1863:(e,t,r)=>{"use strict";function n(){return Math.floor(performance.now())}r.d(t,{t:()=>n})},944:(e,t,r)=>{"use strict";function n(e,t){"function"==typeof console.debug&&console.debug("New Relic Warning: https://github.com/newrelic/newrelic-browser-agent/blob/main/docs/warning-codes.md#".concat(e),t)}r.d(t,{R:()=>n})},5284:(e,t,r)=>{"use strict";r.d(t,{t:()=>c,B:()=>s});var n=r(7836),i=r(6154);const o="newrelic";const a=new Set,s={};function c(e,t){const r=n.ee.get(t);s[t]??={},e&&"object"==typeof e&&(a.has(t)||(r.emit("rumresp",[e]),s[t]=e,a.add(t),function(e={}){try{i.gm.dispatchEvent(new CustomEvent(o,{detail:e}))}catch(e){}}({loaded:!0})))}},8990:(e,t,r)=>{"use strict";r.d(t,{I:()=>i});var n=Object.prototype.hasOwnProperty;function i(e,t,r){if(n.call(e,t))return e[t];var i=r();if(Object.defineProperty&&Object.keys)try{return Object.defineProperty(e,t,{value:i,writable:!0,enumerable:!1}),i}catch(e){}return e[t]=i,i}},6389:(e,t,r)=>{"use strict";function n(e,t=500,r={}){const n=r?.leading||!1;let i;return(...r)=>{n&&void 0===i&&(e.apply(this,r),i=setTimeout((()=>{i=clearTimeout(i)}),t)),n||(clearTimeout(i),i=setTimeout((()=>{e.apply(this,r)}),t))}}function i(e){let t=!1;return(...r)=>{t||(t=!0,e.apply(this,r))}}r.d(t,{J:()=>i,s:()=>n})},5289:(e,t,r)=>{"use strict";r.d(t,{GG:()=>o,sB:()=>a});var n=r(3878);function i(){return"undefined"==typeof document||"complete"===document.readyState}function o(e,t){if(i())return e();(0,n.sp)("load",e,t)}function a(e){if(i())return e();(0,n.DD)("DOMContentLoaded",e)}},384:(e,t,r)=>{"use strict";r.d(t,{NT:()=>o,US:()=>d,Zm:()=>a,bQ:()=>c,dV:()=>s,nY:()=>u,pV:()=>l});var n=r(6154),i=r(1863);const o={beacon:"bam.nr-data.net",errorBeacon:"bam.nr-data.net"};function a(){return n.gm.NREUM||(n.gm.NREUM={}),void 0===n.gm.newrelic&&(n.gm.newrelic=n.gm.NREUM),n.gm.NREUM}function s(){let e=a();return e.o||(e.o={ST:n.gm.setTimeout,SI:n.gm.setImmediate,CT:n.gm.clearTimeout,XHR:n.gm.XMLHttpRequest,REQ:n.gm.Request,EV:n.gm.Event,PR:n.gm.Promise,MO:n.gm.MutationObserver,FETCH:n.gm.fetch,WS:n.gm.WebSocket}),e}function c(e,t){let r=a();r.initializedAgents??={},t.initializedAt={ms:(0,i.t)(),date:new Date},r.initializedAgents[e]=t}function u(e){let t=a();return t.initializedAgents?.[e]}function d(e,t){a()[e]=t}function l(){return function(){let e=a();const t=e.info||{};e.info={beacon:o.beacon,errorBeacon:o.errorBeacon,...t}}(),function(){let e=a();const t=e.init||{};e.init={...t}}(),s(),function(){let e=a();const t=e.loader_config||{};e.loader_config={...t}}(),a()}},2843:(e,t,r)=>{"use strict";r.d(t,{u:()=>i});var n=r(3878);function i(e,t=!1,r,i){(0,n.DD)("visibilitychange",(function(){if(t)return void("hidden"===document.visibilityState&&e());e(document.visibilityState)}),r,i)}},3434:(e,t,r)=>{"use strict";r.d(t,{YM:()=>c});var n=r(7836),i=r(5607);const o="nr@original:".concat(i.W);var a=Object.prototype.hasOwnProperty,s=!1;function c(e,t){return e||(e=n.ee),r.inPlace=function(e,t,n,i,o){n||(n="");const a="-"===n.charAt(0);for(let s=0;s<t.length;s++){const c=t[s],u=e[c];d(u)||(e[c]=r(u,a?c+n:n,i,c,o))}},r.flag=o,r;function r(t,r,n,s,c){return d(t)?t:(r||(r=""),nrWrapper[o]=t,function(e,t,r){if(Object.defineProperty&&Object.keys)try{return Object.keys(e).forEach((function(r){Object.defineProperty(t,r,{get:function(){return e[r]},set:function(t){return e[r]=t,t}})})),t}catch(e){u([e],r)}for(var n in e)a.call(e,n)&&(t[n]=e[n])}(t,nrWrapper,e),nrWrapper);function nrWrapper(){var o,a,d,l;try{a=this,o=[...arguments],d="function"==typeof n?n(o,a):n||{}}catch(t){u([t,"",[o,a,s],d],e)}i(r+"start",[o,a,s],d,c);try{return l=t.apply(a,o)}catch(e){throw i(r+"err",[o,a,e],d,c),e}finally{i(r+"end",[o,a,l],d,c)}}}function i(r,n,i,o){if(!s||t){var a=s;s=!0;try{e.emit(r,n,i,t,o)}catch(t){u([t,r,n,i],e)}s=a}}}function u(e,t){t||(t=n.ee);try{t.emit("internal-error",e)}catch(e){}}function d(e){return!(e&&"function"==typeof e&&e.apply&&!e[o])}},993:(e,t,r)=>{"use strict";r.d(t,{ET:()=>o,p_:()=>i});var n=r(860);const i={ERROR:"ERROR",WARN:"WARN",INFO:"INFO",DEBUG:"DEBUG",TRACE:"TRACE"},o="log";n.K7.logging},3969:(e,t,r)=>{"use strict";r.d(t,{TZ:()=>n,XG:()=>s,rs:()=>i,xV:()=>a,z_:()=>o});const n=r(860).K7.metrics,i="sm",o="cm",a="storeSupportabilityMetrics",s="storeEventMetrics"},6630:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.pageViewEvent},782:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.pageViewTiming},6344:(e,t,r)=>{"use strict";r.d(t,{G4:()=>i});var n=r(2614);r(860).K7.sessionReplay;const i={RECORD:"recordReplay",PAUSE:"pauseReplay",REPLAY_RUNNING:"replayRunning",ERROR_DURING_REPLAY:"errorDuringReplay"};n.g.ERROR,n.g.FULL,n.g.OFF},4234:(e,t,r)=>{"use strict";r.d(t,{W:()=>o});var n=r(7836),i=r(1687);class o{constructor(e,t){this.agentIdentifier=e,this.ee=n.ee.get(e),this.featureName=t,this.blocked=!1}deregisterDrain(){(0,i.x3)(this.agentIdentifier,this.featureName)}}},7603:(e,t,r)=>{"use strict";r.d(t,{j:()=>P});var n=r(860),i=r(2555),o=r(3371),a=r(9908),s=r(7836),c=r(1687),u=r(5289),d=r(6154),l=r(944),f=r(3969),g=r(384),p=r(6344);const h=["setErrorHandler","finished","addToTrace","addRelease","addPageAction","setCurrentRouteName","setPageViewName","setCustomAttribute","interaction","noticeError","setUserId","setApplicationVersion","start",p.G4.RECORD,p.G4.PAUSE,"log","wrapLogger"],v=["setErrorHandler","finished","addToTrace","addRelease"];var m=r(1863),b=r(2614),y=r(993);var w=r(2646),A=r(3434);function R(e,t,r,n){if("object"!=typeof t||!t||"string"!=typeof r||!r||"function"!=typeof t[r])return(0,l.R)(29);const i=function(e){return(e||s.ee).get("logger")}(e),o=(0,A.YM)(i),a=new w.y(s.P);return a.level=n.level,a.customAttributes=n.customAttributes,o.inPlace(t,[r],"wrap-logger-",a),i}function E(){const e=(0,g.pV)();h.forEach((t=>{e[t]=(...r)=>function(t,...r){let n=[];return Object.values(e.initializedAgents).forEach((e=>{e&&e.api?e.exposed&&e.api[t]&&n.push(e.api[t](...r)):(0,l.R)(38,t)})),n.length>1?n:n[0]}(t,...r)}))}const x={};function _(e,t,g=!1){t||(0,c.Ak)(e,"api");const h={};var w=s.ee.get(e),A=w.get("tracer");x[e]=b.g.OFF,w.on(p.G4.REPLAY_RUNNING,(t=>{x[e]=t}));var E="api-",_=E+"ixn-";function N(t,r,n,o){const a=(0,i.Vp)(e);return null===r?delete a.jsAttributes[t]:(0,i.x1)(e,{...a,jsAttributes:{...a.jsAttributes,[t]:r}}),j(E,n,!0,o||null===r?"session":void 0)(t,r)}function T(){}h.log=function(e,{customAttributes:t={},level:r=y.p_.INFO}={}){(0,a.p)(f.xV,["API/log/called"],void 0,n.K7.metrics,w),function(e,t,r={},i=y.p_.INFO){(0,a.p)(f.xV,["API/logging/".concat(i.toLowerCase(),"/called")],void 0,n.K7.metrics,e),(0,a.p)(y.ET,[(0,m.t)(),t,r,i],void 0,n.K7.logging,e)}(w,e,t,r)},h.wrapLogger=(e,t,{customAttributes:r={},level:i=y.p_.INFO}={})=>{(0,a.p)(f.xV,["API/wrapLogger/called"],void 0,n.K7.metrics,w),R(w,e,t,{customAttributes:r,level:i})},v.forEach((e=>{h[e]=j(E,e,!0,"api")})),h.addPageAction=j(E,"addPageAction",!0,n.K7.genericEvents),h.setPageViewName=function(t,r){if("string"==typeof t)return"/"!==t.charAt(0)&&(t="/"+t),(0,o.f)(e).customTransaction=(r||"http://custom.transaction")+t,j(E,"setPageViewName",!0)()},h.setCustomAttribute=function(e,t,r=!1){if("string"==typeof e){if(["string","number","boolean"].includes(typeof t)||null===t)return N(e,t,"setCustomAttribute",r);(0,l.R)(40,typeof t)}else(0,l.R)(39,typeof e)},h.setUserId=function(e){if("string"==typeof e||null===e)return N("enduser.id",e,"setUserId",!0);(0,l.R)(41,typeof e)},h.setApplicationVersion=function(e){if("string"==typeof e||null===e)return N("application.version",e,"setApplicationVersion",!1);(0,l.R)(42,typeof e)},h.start=()=>{try{(0,a.p)(f.xV,["API/start/called"],void 0,n.K7.metrics,w),w.emit("manual-start-all")}catch(e){(0,l.R)(23,e)}},h[p.G4.RECORD]=function(){(0,a.p)(f.xV,["API/recordReplay/called"],void 0,n.K7.metrics,w),(0,a.p)(p.G4.RECORD,[],void 0,n.K7.sessionReplay,w)},h[p.G4.PAUSE]=function(){(0,a.p)(f.xV,["API/pauseReplay/called"],void 0,n.K7.metrics,w),(0,a.p)(p.G4.PAUSE,[],void 0,n.K7.sessionReplay,w)},h.interaction=function(e){return(new T).get("object"==typeof e?e:{})};const S=T.prototype={createTracer:function(e,t){var r={},i=this,o="function"==typeof t;return(0,a.p)(f.xV,["API/createTracer/called"],void 0,n.K7.metrics,w),g||(0,a.p)(_+"tracer",[(0,m.t)(),e,r],i,n.K7.spa,w),function(){if(A.emit((o?"":"no-")+"fn-start",[(0,m.t)(),i,o],r),o)try{return t.apply(this,arguments)}catch(e){const t="string"==typeof e?new Error(e):e;throw A.emit("fn-err",[arguments,this,t],r),t}finally{A.emit("fn-end",[(0,m.t)()],r)}}}};function j(e,t,r,i){return function(){return(0,a.p)(f.xV,["API/"+t+"/called"],void 0,n.K7.metrics,w),i&&(0,a.p)(e+t,[(0,m.t)(),...arguments],r?null:this,i,w),r?void 0:this}}function k(){r.e(296).then(r.bind(r,8778)).then((({setAPI:t})=>{t(e),(0,c.Ze)(e,"api")})).catch((e=>{(0,l.R)(27,e),w.abort()}))}return["actionText","setName","setAttribute","save","ignore","onEnd","getContext","end","get"].forEach((e=>{S[e]=j(_,e,void 0,g?n.K7.softNav:n.K7.spa)})),h.setCurrentRouteName=g?j(_,"routeName",void 0,n.K7.softNav):j(E,"routeName",!0,n.K7.spa),h.noticeError=function(t,r){"string"==typeof t&&(t=new Error(t)),(0,a.p)(f.xV,["API/noticeError/called"],void 0,n.K7.metrics,w),(0,a.p)("err",[t,(0,m.t)(),!1,r,!!x[e]],void 0,n.K7.jserrors,w)},d.RI?(0,u.GG)((()=>k()),!0):k(),h}var N=r(9417),T=r(8122);const S={accountID:void 0,trustKey:void 0,agentID:void 0,licenseKey:void 0,applicationID:void 0,xpid:void 0},j={};var k=r(5284);const I=e=>{const t=e.startsWith("http");e+="/",r.p=t?e:"https://"+e};let O=!1;function P(e,t={},r,n){let{init:a,info:c,loader_config:u,runtime:l={},exposed:f=!0}=t;l.loaderType=r;const p=(0,g.pV)();c||(a=p.init,c=p.info,u=p.loader_config),(0,N.xN)(e.agentIdentifier,a||{}),function(e,t){if(!e)throw new Error("All loader-config objects require an agent identifier!");j[e]=(0,T.a)(t,S);const r=(0,g.nY)(e);r&&(r.loader_config=j[e])}(e.agentIdentifier,u||{}),c.jsAttributes??={},d.bv&&(c.jsAttributes.isWorker=!0),(0,i.x1)(e.agentIdentifier,c);const h=(0,N.D0)(e.agentIdentifier),v=[c.beacon,c.errorBeacon];O||(h.proxy.assets&&(I(h.proxy.assets),v.push(h.proxy.assets)),h.proxy.beacon&&v.push(h.proxy.beacon),E(),(0,g.US)("activatedFeatures",k.B),e.runSoftNavOverSpa&&=!0===h.soft_navigations.enabled&&h.feature_flags.includes("soft_nav")),l.denyList=[...h.ajax.deny_list||[],...h.ajax.block_internal?v:[]],l.ptid=e.agentIdentifier,(0,o.V)(e.agentIdentifier,l),e.ee=s.ee.get(e.agentIdentifier),void 0===e.api&&(e.api=_(e.agentIdentifier,n,e.runSoftNavOverSpa)),void 0===e.exposed&&(e.exposed=f),O=!0}},8374:(e,t,r)=>{r.nc=(()=>{try{return document?.currentScript?.nonce}catch(e){}return""})()},860:(e,t,r)=>{"use strict";r.d(t,{$J:()=>o,K7:()=>n,P3:()=>i});const n={ajax:"ajax",genericEvents:"generic_events",jserrors:"jserrors",logging:"logging",metrics:"metrics",pageAction:"page_action",pageViewEvent:"page_view_event",pageViewTiming:"page_view_timing",sessionReplay:"session_replay",sessionTrace:"session_trace",softNav:"soft_navigations",spa:"spa"},i={[n.pageViewEvent]:1,[n.pageViewTiming]:2,[n.metrics]:3,[n.jserrors]:4,[n.spa]:5,[n.ajax]:6,[n.sessionTrace]:7,[n.softNav]:8,[n.sessionReplay]:9,[n.logging]:10,[n.genericEvents]:11},o={[n.pageViewTiming]:"events",[n.ajax]:"events",[n.spa]:"events",[n.softNav]:"events",[n.metrics]:"jserrors",[n.jserrors]:"jserrors",[n.sessionTrace]:"browser/blobs",[n.sessionReplay]:"browser/blobs",[n.logging]:"browser/logs",[n.genericEvents]:"ins"}}},n={};function i(e){var t=n[e];if(void 0!==t)return t.exports;var o=n[e]={exports:{}};return r[e](o,o.exports,i),o.exports}i.m=r,i.d=(e,t)=>{for(var r in t)i.o(t,r)&&!i.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},i.f={},i.e=e=>Promise.all(Object.keys(i.f).reduce(((t,r)=>(i.f[r](e,t),t)),[])),i.u=e=>"nr-rum-1.274.0.min.js",i.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),e={},t="NRBA-1.274.0.PROD:",i.l=(r,n,o,a)=>{if(e[r])e[r].push(n);else{var s,c;if(void 0!==o)for(var u=document.getElementsByTagName("script"),d=0;d<u.length;d++){var l=u[d];if(l.getAttribute("src")==r||l.getAttribute("data-webpack")==t+o){s=l;break}}if(!s){c=!0;var f={296:"sha512-gkYkZDAwQ9PwaDXs2YM+rNIdRej1Ac1mupWobRJ8eahQcXz6/sunGZCKklrzi5kWxhOGRZr2tn0rEKuLTXzfAA=="};(s=document.createElement("script")).charset="utf-8",s.timeout=120,i.nc&&s.setAttribute("nonce",i.nc),s.setAttribute("data-webpack",t+o),s.src=r,0!==s.src.indexOf(window.location.origin+"/")&&(s.crossOrigin="anonymous"),f[a]&&(s.integrity=f[a])}e[r]=[n];var g=(t,n)=>{s.onerror=s.onload=null,clearTimeout(p);var i=e[r];if(delete e[r],s.parentNode&&s.parentNode.removeChild(s),i&&i.forEach((e=>e(n))),t)return t(n)},p=setTimeout(g.bind(null,void 0,{type:"timeout",target:s}),12e4);s.onerror=g.bind(null,s.onerror),s.onload=g.bind(null,s.onload),c&&document.head.appendChild(s)}},i.r=e=>{"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},i.p="https://js-agent.newrelic.com/",(()=>{var e={840:0,374:0};i.f.j=(t,r)=>{var n=i.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var o=new Promise(((r,i)=>n=e[t]=[r,i]));r.push(n[2]=o);var a=i.p+i.u(t),s=new Error;i.l(a,(r=>{if(i.o(e,t)&&(0!==(n=e[t])&&(e[t]=void 0),n)){var o=r&&("load"===r.type?"missing":r.type),a=r&&r.target&&r.target.src;s.message="Loading chunk "+t+" failed.\n("+o+": "+a+")",s.name="ChunkLoadError",s.type=o,s.request=a,n[1](s)}}),"chunk-"+t,t)}};var t=(t,r)=>{var n,o,[a,s,c]=r,u=0;if(a.some((t=>0!==e[t]))){for(n in s)i.o(s,n)&&(i.m[n]=s[n]);if(c)c(i)}for(t&&t(r);u<a.length;u++)o=a[u],i.o(e,o)&&e[o]&&e[o][0](),e[o]=0},r=self["webpackChunk:NRBA-1.274.0.PROD"]=self["webpackChunk:NRBA-1.274.0.PROD"]||[];r.forEach(t.bind(null,0)),r.push=t.bind(null,r.push.bind(r))})(),(()=>{"use strict";i(8374);var e=i(944),t=i(6344),r=i(9566);class n{agentIdentifier;constructor(e=(0,r.LA)(16)){this.agentIdentifier=e}#e(t,...r){if("function"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}addPageAction(e,t){return this.#e("addPageAction",e,t)}setPageViewName(e,t){return this.#e("setPageViewName",e,t)}setCustomAttribute(e,t,r){return this.#e("setCustomAttribute",e,t,r)}noticeError(e,t){return this.#e("noticeError",e,t)}setUserId(e){return this.#e("setUserId",e)}setApplicationVersion(e){return this.#e("setApplicationVersion",e)}setErrorHandler(e){return this.#e("setErrorHandler",e)}addRelease(e,t){return this.#e("addRelease",e,t)}log(e,t){return this.#e("log",e,t)}}class o extends n{#e(t,...r){if("function"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}start(){return this.#e("start")}finished(e){return this.#e("finished",e)}recordReplay(){return this.#e(t.G4.RECORD)}pauseReplay(){return this.#e(t.G4.PAUSE)}addToTrace(e){return this.#e("addToTrace",e)}setCurrentRouteName(e){return this.#e("setCurrentRouteName",e)}interaction(){return this.#e("interaction")}wrapLogger(e,t,r){return this.#e("wrapLogger",e,t,r)}}var a=i(860),s=i(9417);const c=Object.values(a.K7);function u(e){const t={};return c.forEach((r=>{t[r]=function(e,t){return!0===(0,s.gD)(t,"".concat(e,".enabled"))}(r,e)})),t}var d=i(7603);var l=i(1687),f=i(4234),g=i(5289),p=i(6154),h=i(384);const v=e=>p.RI&&!0===(0,s.gD)(e,"privacy.cookies_enabled");function m(e){return!!(0,h.dV)().o.MO&&v(e)&&!0===(0,s.gD)(e,"session_trace.enabled")}var b=i(6389);class y extends f.W{constructor(e,t,r=!0){super(e.agentIdentifier,t),this.auto=r,this.abortHandler=void 0,this.featAggregate=void 0,this.onAggregateImported=void 0,!1===e.init[this.featureName].autoStart&&(this.auto=!1),this.auto?(0,l.Ak)(e.agentIdentifier,t):this.ee.on("manual-start-all",(0,b.J)((()=>{(0,l.Ak)(e.agentIdentifier,this.featureName),this.auto=!0,this.importAggregator(e)})))}importAggregator(t,r={}){if(this.featAggregate||!this.auto)return;let n;this.onAggregateImported=new Promise((e=>{n=e}));const o=async()=>{let o;try{if(v(this.agentIdentifier)){const{setupAgentSession:e}=await i.e(296).then(i.bind(i,3861));o=e(t)}}catch(t){(0,e.R)(20,t),this.ee.emit("internal-error",[t]),this.featureName===a.K7.sessionReplay&&this.abortHandler?.()}try{if(t.sharedAggregator)await t.sharedAggregator;else{t.sharedAggregator=i.e(296).then(i.bind(i,9337));const{EventAggregator:e}=await t.sharedAggregator;t.sharedAggregator=new e}if(!this.#t(this.featureName,o))return(0,l.Ze)(this.agentIdentifier,this.featureName),void n(!1);const{lazyFeatureLoader:e}=await i.e(296).then(i.bind(i,6103)),{Aggregate:a}=await e(this.featureName,"aggregate");this.featAggregate=new a(t,r),n(!0)}catch(t){(0,e.R)(34,t),this.abortHandler?.(),(0,l.Ze)(this.agentIdentifier,this.featureName,!0),n(!1),this.ee&&this.ee.abort()}};p.RI?(0,g.GG)((()=>o()),!0):o()}#t(e,t){switch(e){case a.K7.sessionReplay:return m(this.agentIdentifier)&&!!t;case a.K7.sessionTrace:return!!t;default:return!0}}}var w=i(6630);class A extends y{static featureName=w.T;constructor(e,t=!0){super(e,w.T,t),this.importAggregator(e)}}var R=i(9908),E=i(2843),x=i(3878),_=i(782),N=i(1863);class T extends y{static featureName=_.T;constructor(e,t=!0){super(e,_.T,t),p.RI&&((0,E.u)((()=>(0,R.p)("docHidden",[(0,N.t)()],void 0,_.T,this.ee)),!0),(0,x.sp)("pagehide",(()=>(0,R.p)("winPagehide",[(0,N.t)()],void 0,_.T,this.ee))),this.importAggregator(e))}}var S=i(3969);class j extends y{static featureName=S.TZ;constructor(e,t=!0){super(e,S.TZ,t),this.importAggregator(e)}}new class extends o{constructor(t,r){super(r),p.gm?(this.features={},(0,h.bQ)(this.agentIdentifier,this),this.desiredFeatures=new Set(t.features||[]),this.desiredFeatures.add(A),this.runSoftNavOverSpa=[...this.desiredFeatures].some((e=>e.featureName===a.K7.softNav)),(0,d.j)(this,t,t.loaderType||"agent"),this.run()):(0,e.R)(21)}get config(){return{info:this.info,init:this.init,loader_config:this.loader_config,runtime:this.runtime}}run(){try{const t=u(this.agentIdentifier),r=[...this.desiredFeatures];r.sort(((e,t)=>a.P3[e.featureName]-a.P3[t.featureName])),r.forEach((r=>{if(!t[r.featureName]&&r.featureName!==a.K7.pageViewEvent)return;if(this.runSoftNavOverSpa&&r.featureName===a.K7.spa)return;if(!this.runSoftNavOverSpa&&r.featureName===a.K7.softNav)return;const n=function(e){switch(e){case a.K7.ajax:return[a.K7.jserrors];case a.K7.sessionTrace:return[a.K7.ajax,a.K7.pageViewEvent];case a.K7.sessionReplay:return[a.K7.sessionTrace];case a.K7.pageViewTiming:return[a.K7.pageViewEvent];default:return[]}}(r.featureName).filter((e=>!(e in this.features)));n.length>0&&(0,e.R)(36,{targetFeature:r.featureName,missingDependencies:n}),this.features[r.featureName]=new r(this)}))}catch(t){(0,e.R)(22,t);for(const e in this.features)this.features[e].abortHandler?.();const r=(0,h.Zm)();delete r.initializedAgents[this.agentIdentifier]?.api,delete r.initializedAgents[this.agentIdentifier]?.features,delete this.sharedAggregator;return r.ee.get(this.agentIdentifier).abort(),!1}}}({features:[A,T,j],loaderType:"lite"})})()})();</script> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="profile" href="https://gmpg.org/xfn/11"> <link rel="preconnect" href="https://fonts.googleapis.com"> <link rel="preconnect" href="https://fonts.gstatic.com" crossorigin> <link rel="preload" href="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/fonts/RobotoSerif-Medium.00ec4109.woff" as="font" type="font/woff" crossorigin="anonymous"> <link rel="preload" href="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/fonts/RobotoSerif-Medium.a8a104b1.woff2" as="font" type="font/woff2" crossorigin="anonymous"> <link rel="preload" href="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Regular.b009a76a.woff2" as="font" type="font/woff2" crossorigin="anonymous"> <link rel="preload" href="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Regular.f1e2a767.woff" as="font" type="font/woff" crossorigin="anonymous"> <link rel="preload" href="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Bold.227c9319.woff2" as="font" type="font/woff2" crossorigin="anonymous"> <link rel="preload" href="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Bold.77ecb942.woff" as="font" type="font/woff" crossorigin="anonymous"> <link rel="preload" href="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Black.2e8becfc.woff2" as="font" type="font/woff2" crossorigin="anonymous"> <link rel="preload" href="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Black.f5677eb2.woff" as="font" type="font/woff" crossorigin="anonymous"> <!-- This site is optimized with the Yoast SEO Premium plugin v23.8 (Yoast SEO v23.8) - https://yoast.com/wordpress/plugins/seo/ --> <title>Glossary | Malwarebytes</title> <meta name="description" content="Find the list of cybersecurity terms explained from A to Z here." /> <link rel="canonical" href="https://www.malwarebytes.com/glossary" /> <meta property="og:type" content="article" /> <meta property="og:title" content="Glossary | Malwarebytes" /> <meta property="og:description" content="Find the list of cybersecurity terms explained from A to Z here." /> <meta property="og:url" content="https://www.malwarebytes.com/glossary" /> <meta property="og:site_name" content="Malwarebytes" /> <meta property="article:publisher" content="https://www.facebook.com/Malwarebytes" /> <meta property="article:modified_time" content="2023-12-18T20:45:42+00:00" /> <meta property="og:image" content="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/09/generic.png" /> <meta property="og:image:width" content="1200" /> <meta property="og:image:height" content="680" /> <meta property="og:image:type" content="image/png" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:title" content="Glossary | Malwarebytes" /> <meta name="twitter:description" content="Find the list of cybersecurity terms explained from A to Z here." /> <meta name="twitter:image" content="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/09/generic.png" /> <meta name="twitter:site" content="@malwarebytes" /> <meta name="twitter:label1" content="Est. reading time" /> <meta name="twitter:data1" content="1 minute" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"WebPage","@id":"https://www.malwarebytes.com/glossary","url":"https://www.malwarebytes.com/glossary","name":"Glossary | Malwarebytes","isPartOf":{"@id":"https://www.malwarebytes.com/#website"},"datePublished":"2023-05-17T19:02:01+00:00","dateModified":"2023-12-18T20:45:42+00:00","description":"Find the list of cybersecurity terms explained from A to Z here.","breadcrumb":{"@id":"https://www.malwarebytes.com/glossary#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https://www.malwarebytes.com/glossary"]}]},{"@type":"BreadcrumbList","@id":"https://www.malwarebytes.com/glossary#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.malwarebytes.com/"},{"@type":"ListItem","position":2,"name":"Glossary"}]},{"@type":"WebSite","@id":"https://www.malwarebytes.com/#website","url":"https://www.malwarebytes.com/","name":"Malwarebytes","description":"Cyber Security Software &amp; Anti-Malware","publisher":{"@id":"https://www.malwarebytes.com/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://www.malwarebytes.com/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https://www.malwarebytes.com/#organization","name":"Malwarebytes","url":"https://www.malwarebytes.com/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https://www.malwarebytes.com/#/schema/logo/image/","url":"https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/11/Malwarebytes-logo.png","contentUrl":"https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/11/Malwarebytes-logo.png","width":1200,"height":675,"caption":"Malwarebytes"},"image":{"@id":"https://www.malwarebytes.com/#/schema/logo/image/"},"sameAs":["https://www.facebook.com/Malwarebytes","https://x.com/malwarebytes","https://www.linkedin.com/company/malwarebytes","https://www.youtube.com/user/Malwarebytes","https://www.instagram.com/malwarebytesofficial"]}]}</script> <meta name="googlebot" content="index, follow" /> <!-- / Yoast SEO Premium plugin. --> <link rel='dns-prefetch' href='//stats.wp.com' /> <!-- Start VWO Async SmartCode --> <link rel="preconnect" href="https://dev.visualwebsiteoptimizer.com" /> <script type='text/javascript' id='vwoCode'> window._vwo_code || (function() { var account_id=622914, version=2.1, settings_tolerance=5000, hide_element='body', hide_element_style = 'opacity:0 !important;filter:alpha(opacity=0) !important;background:none !important;transition:none !important;', /* DO NOT EDIT BELOW THIS LINE */ f=false,w=window,d=document,v=d.querySelector('#vwoCode'),cK='_vwo_'+account_id+'_settings',cc={};try{var c=JSON.parse(localStorage.getItem('_vwo_'+account_id+'_config'));cc=c&&typeof c==='object'?c:{}}catch(e){}var stT=cc.stT==='session'?w.sessionStorage:w.localStorage;code={nonce:v&&v.nonce,use_existing_jquery:function(){return typeof use_existing_jquery!=='undefined'?use_existing_jquery:undefined},library_tolerance:function(){return typeof library_tolerance!=='undefined'?library_tolerance:undefined},settings_tolerance:function(){return cc.sT||settings_tolerance},hide_element_style:function(){return'{'+(cc.hES||hide_element_style)+'}'},hide_element:function(){if(performance.getEntriesByName('first-contentful-paint')[0]){return''}return typeof cc.hE==='string'?cc.hE:hide_element},getVersion:function(){return version},finish:function(e){if(!f){f=true;var t=d.getElementById('_vis_opt_path_hides');if(t)t.parentNode.removeChild(t);if(e)(new Image).src='https://dev.visualwebsiteoptimizer.com/ee.gif?a='+account_id+e}},finished:function(){return f},addScript:function(e){var t=d.createElement('script');t.type='text/javascript';if(e.src){t.src=e.src}else{t.text=e.text}v&&t.setAttribute('nonce',v.nonce);d.getElementsByTagName('head')[0].appendChild(t)},load:function(e,t){var n=this.getSettings(),i=d.createElement('script'),r=this;t=t||{};if(n){i.textContent=n;d.getElementsByTagName('head')[0].appendChild(i);if(!w.VWO||VWO.caE){stT.removeItem(cK);r.load(e)}}else{var o=new XMLHttpRequest;o.open('GET',e,true);o.withCredentials=!t.dSC;o.responseType=t.responseType||'text';o.onload=function(){if(t.onloadCb){return t.onloadCb(o,e)}if(o.status===200||o.status===304){_vwo_code.addScript({text:o.responseText})}else{_vwo_code.finish('&e=loading_failure:'+e)}};o.onerror=function(){if(t.onerrorCb){return t.onerrorCb(e)}_vwo_code.finish('&e=loading_failure:'+e)};o.send()}},getSettings:function(){try{var e=stT.getItem(cK);if(!e){return}e=JSON.parse(e);if(Date.now()>e.e){stT.removeItem(cK);return}return e.s}catch(e){return}},init:function(){if(d.URL.indexOf('__vwo_disable__')>-1)return;var e=this.settings_tolerance();w._vwo_settings_timer=setTimeout(function(){_vwo_code.finish();stT.removeItem(cK)},e);var t;if(this.hide_element()!=='body'){t=d.createElement('style');var n=this.hide_element(),i=n?n+this.hide_element_style():'',r=d.getElementsByTagName('head')[0];t.setAttribute('id','_vis_opt_path_hides');v&&t.setAttribute('nonce',v.nonce);t.setAttribute('type','text/css');if(t.styleSheet)t.styleSheet.cssText=i;else t.appendChild(d.createTextNode(i));r.appendChild(t)}else{t=d.getElementsByTagName('head')[0];var i=d.createElement('div');i.style.cssText='z-index: 2147483647 !important;position: fixed !important;left: 0 !important;top: 0 !important;width: 100% !important;height: 100% !important;background: white !important;';i.setAttribute('id','_vis_opt_path_hides');i.classList.add('_vis_hide_layer');t.parentNode.insertBefore(i,t.nextSibling)}var o=window._vis_opt_url||d.URL,s='https://dev.visualwebsiteoptimizer.com/j.php?a='+account_id+'&u='+encodeURIComponent(o)+'&vn='+version;if(w.location.search.indexOf('_vwo_xhr')!==-1){this.addScript({src:s})}else{this.load(s+'&x=true')}}};w._vwo_code=code;code.init();})(); </script> <!-- End VWO Async SmartCode --> <link rel='preload' href='/wp-content/themes/malwarebytes/assets/build/images/ajax-loader.6f9ac78c.gif' as='image'> <link rel='preload' href='/wp-content/themes/malwarebytes/assets/build/images/app-play.5ed26b30.png' as='image'> <link rel='preload' href='/wp-content/themes/malwarebytes/assets/build/images/app-store.0d6e625d.png' as='image'> <style id='wp-block-library-inline-css'> :root{--wp-admin-theme-color:#007cba;--wp-admin-theme-color--rgb:0,124,186;--wp-admin-theme-color-darker-10:#006ba1;--wp-admin-theme-color-darker-10--rgb:0,107,161;--wp-admin-theme-color-darker-20:#005a87;--wp-admin-theme-color-darker-20--rgb:0,90,135;--wp-admin-border-width-focus:2px;--wp-block-synced-color:#7a00df;--wp-block-synced-color--rgb:122,0,223;--wp-bound-block-color:#9747ff}@media (min-resolution:192dpi){:root{--wp-admin-border-width-focus:1.5px}}.wp-element-button{cursor:pointer}:root{--wp--preset--font-size--normal:16px;--wp--preset--font-size--huge:42px}:root .has-very-light-gray-background-color{background-color:#eee}:root .has-very-dark-gray-background-color{background-color:#313131}:root .has-very-light-gray-color{color:#eee}:root .has-very-dark-gray-color{color:#313131}:root .has-vivid-green-cyan-to-vivid-cyan-blue-gradient-background{background:linear-gradient(135deg,#00d084,#0693e3)}:root .has-purple-crush-gradient-background{background:linear-gradient(135deg,#34e2e4,#4721fb 50%,#ab1dfe)}:root .has-hazy-dawn-gradient-background{background:linear-gradient(135deg,#faaca8,#dad0ec)}:root .has-subdued-olive-gradient-background{background:linear-gradient(135deg,#fafae1,#67a671)}:root .has-atomic-cream-gradient-background{background:linear-gradient(135deg,#fdd79a,#004a59)}:root .has-nightshade-gradient-background{background:linear-gradient(135deg,#330968,#31cdcf)}:root .has-midnight-gradient-background{background:linear-gradient(135deg,#020381,#2874fc)}.has-regular-font-size{font-size:1em}.has-larger-font-size{font-size:2.625em}.has-normal-font-size{font-size:var(--wp--preset--font-size--normal)}.has-huge-font-size{font-size:var(--wp--preset--font-size--huge)}.has-text-align-center{text-align:center}.has-text-align-left{text-align:left}.has-text-align-right{text-align:right}#end-resizable-editor-section{display:none}.aligncenter{clear:both}.items-justified-left{justify-content:flex-start}.items-justified-center{justify-content:center}.items-justified-right{justify-content:flex-end}.items-justified-space-between{justify-content:space-between}.screen-reader-text{border:0;clip:rect(1px,1px,1px,1px);-webkit-clip-path:inset(50%);clip-path:inset(50%);height:1px;margin:-1px;overflow:hidden;padding:0;position:absolute;width:1px;word-wrap:normal!important}.screen-reader-text:focus{background-color:#ddd;clip:auto!important;-webkit-clip-path:none;clip-path:none;color:#444;display:block;font-size:1em;height:auto;left:5px;line-height:normal;padding:15px 23px 14px;text-decoration:none;top:5px;width:auto;z-index:100000}html :where(.has-border-color){border-style:solid}html :where([style*=border-top-color]){border-top-style:solid}html :where([style*=border-right-color]){border-right-style:solid}html :where([style*=border-bottom-color]){border-bottom-style:solid}html :where([style*=border-left-color]){border-left-style:solid}html :where([style*=border-width]){border-style:solid}html :where([style*=border-top-width]){border-top-style:solid}html :where([style*=border-right-width]){border-right-style:solid}html :where([style*=border-bottom-width]){border-bottom-style:solid}html :where([style*=border-left-width]){border-left-style:solid}html :where(img[class*=wp-image-]){height:auto;max-width:100%}:where(figure){margin:0 0 1em}html :where(.is-position-sticky){--wp-admin--admin-bar--position-offset:var(--wp-admin--admin-bar--height,0px)}@media screen and (max-width:600px){html :where(.is-position-sticky){--wp-admin--admin-bar--position-offset:0px}} </style> <style id='malware-bytes-glossary-list-style-inline-css'> .glossary .glossary__hero{display:flex;align-items:center;justify-content:center;flex-wrap:wrap;min-height:525px;padding:0 30px}.glossary .glossary__hero a{font-size:20px;font-weight:200}.glossary h1{text-align:center;text-transform:uppercase;font-weight:500;font-size:80px;margin:0 0 10px;color:#fff}.glossary h2{font-size:33px;margin:75px 0 24px}.glossary h3{font-size:24px;margin:0 0 24px 0}.glossary p:not(.btn-main),.glossary .glossary__content li{font-size:16px;margin:13px 0;font-weight:300}.glossary .glossary__content ul{padding:0;margin:0;padding-left:20px}.glossary ul.glossary__index{list-style:none;display:flex;justify-content:center;gap:15px;padding:25px 0;flex-wrap:wrap;max-width:710px}.glossary ul.glossary__index a{color:#fff}.glossary .glossary__content{padding:35px 0 49px;text-align:left}.glossary .back-to-top{display:none;position:fixed;top:144px;left:50%;transform:translateX(-50%);box-shadow:0 13px 19px 0 rgba(0,0,0,.3);min-width:auto}.glossary .back-to-top::before{content:"";display:inline-block;vertical-align:middle;margin:-2px 5px 0 0;font-family:"fontawesome"}.glossary .back-to-top.show{display:inline-block}@media (max-width: 1199px){.glossary h1{font-size:60px}}@media (max-width: 767px){.glossary h1{font-size:26px}.glossary h2{font-size:20px}.glossary h3{font-size:16px}.glossary ul.glossary__index{max-width:400px}} </style> <style id='malware-bytes-glossary-style-inline-css'> .glossary .glossary__hero{display:flex;align-items:center;justify-content:center;flex-wrap:wrap;min-height:525px}.glossary .glossary__hero a{font-size:20px;font-weight:200}.glossary h1{text-align:center;text-transform:uppercase;font-weight:500;font-size:80px;margin:0 0 10px;color:#fff}.glossary h2{margin:45px 0 24px !important;color:#000 !important}.glossary h2{font-size:33px;font-family:"Graphik";font-weight:700;line-height:33px}.glossary h3{font-size:24px;margin:0 0 24px 0;font-family:"Graphik";line-height:31px}.glossary p:not(.btn-main),.glossary .glossary__content li{font-size:16px;margin:13px 0;font-weight:300}.glossary .glossary__content ul{padding:0;margin:0;padding-left:20px}.glossary ul.glossary__index{list-style:none;display:flex;justify-content:center;gap:15px;padding:25px 0}.glossary ul.glossary__index a{color:#fff;text-decoration:none}.glossary ul.glossary__index a:hover{text-decoration:none}.glossary .glossary__content{padding:35px 0 49px}.glossary .back-to-top{display:none;position:fixed;top:144px;left:50%;transform:translateX(-50%);box-shadow:0 13px 19px 0 rgba(0,0,0,.3)}.glossary .back-to-top::before{content:"";display:inline-block;vertical-align:middle;margin:-2px 5px 0 0;font-family:"fontawesome"}.glossary .back-to-top.show{display:inline-block}@media (max-width: 1199px){.glossary h1{font-size:60px}}@media (max-width: 767px){.glossary h1{font-size:26px}.glossary h2{font-size:20px}.glossary h3{font-size:16px}} </style> <link rel="preload" as="style" onload="this.onload=null;this.rel='stylesheet'" href='https://www.malwarebytes.com/_static/??-eJyFjEEKwzAMBD9URw1taC6lb3FdRRgUWUQKJr+vSS85BHpbdnYWqoZUxFEclFfKYkBYPC6EnoWqgq5vzgmSHUj4ld2cpWvgAic3FYmLwyeb7/K0tEFo6Z8RVcF8YzQQrGHiSLvzmp/9o7+N12G8D1/NVETq' type='text/css' media='all' /> <noscript><link rel='stylesheet' href='https://www.malwarebytes.com/_static/??-eJyFjEEKwzAMBD9URw1taC6lb3FdRRgUWUQKJr+vSS85BHpbdnYWqoZUxFEclFfKYkBYPC6EnoWqgq5vzgmSHUj4ld2cpWvgAic3FYmLwyeb7/K0tEFo6Z8RVcF8YzQQrGHiSLvzmp/9o7+N12G8D1/NVETq'> </noscript><style id='weglot-css-inline-css'> html:not([lang="en"]) .site-header-searchbox { display: none!important; } </style> <style id='custom-flag-handle-inline-css'> .weglot-flags.flag-0.en>a:before,.weglot-flags.flag-0.en>span:before {background-image: url(https://cdn.weglot.com/flags/rectangle_mat/us.svg); }.weglot-flags.flag-1.en>a:before,.weglot-flags.flag-1.en>span:before {background-image: url(https://cdn.weglot.com/flags/shiny/us.svg); }.weglot-flags.flag-2.en>a:before,.weglot-flags.flag-2.en>span:before {background-image: url(https://cdn.weglot.com/flags/square/us.svg); }.weglot-flags.flag-3.en>a:before,.weglot-flags.flag-3.en>span:before {background-image: url(https://cdn.weglot.com/flags/circle/us.svg); } </style> <link rel="preload" as="style" onload="this.onload=null;this.rel='stylesheet'" href='https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/base-fonts.css?m=1732119224g' type='text/css' media='all' /> <noscript><link rel='stylesheet' href='https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/base-fonts.css?m=1732119224g'> </noscript><style id='malwarebytes-inline-css-inline-css'> @charset "UTF-8";@font-face{font-family:Graphik;src:url('/wp-content/themes/malwarebytes/assets/build/fonts/Graphik-LightItalic.996e7fcf.woff2') format("woff2"),url('/wp-content/themes/malwarebytes/assets/build/fonts/Graphik-LightItalic.a45645a3.woff') format("woff");font-weight:300;font-style:italic;font-display:swap}@font-face{font-family:Graphik;src:url('/wp-content/themes/malwarebytes/assets/build/fonts/Graphik-Bold.61b07a2e.woff2') format("woff2"),url('/wp-content/themes/malwarebytes/assets/build/fonts/Graphik-Bold.3892dcdb.woff') format("woff");font-weight:700;font-style:normal;font-display:swap}@font-face{font-family:Graphik;src:url('/wp-content/themes/malwarebytes/assets/build/fonts/Graphik-Light.8512717f.woff2') format("woff2"),url('/wp-content/themes/malwarebytes/assets/build/fonts/Graphik-Light.5b2af239.woff') format("woff");font-weight:300;font-style:normal;font-display:swap}@font-face{font-family:Graphik;src:url('/wp-content/themes/malwarebytes/assets/build/fonts/Graphik-Semibold.b023d334.woff2') format("woff2"),url('/wp-content/themes/malwarebytes/assets/build/fonts/Graphik-Semibold.93e373cb.woff') format("woff");font-weight:600;font-style:normal;font-display:swap}@font-face{font-family:Graphik;src:url('/wp-content/themes/malwarebytes/assets/build/fonts/Graphik-Semibold.b023d334.woff2') format("woff2"),url('/wp-content/themes/malwarebytes/assets/build/fonts/Graphik-Semibold.93e373cb.woff') format("woff");font-weight:600;font-style:italic;font-display:swap}@font-face{font-family:Graphik;src:url('/wp-content/themes/malwarebytes/assets/build/fonts/Graphik-Medium.3ff48deb.woff2') format("woff2"),url('/wp-content/themes/malwarebytes/assets/build/fonts/Graphik-Medium.62959f61.woff') format("woff");font-weight:500;font-style:normal;font-display:swap}@font-face{font-family:Graphik;src:url('/wp-content/themes/malwarebytes/assets/build/fonts/Graphik-Regular.3fdd19ea.woff2') format("woff2"),url('/wp-content/themes/malwarebytes/assets/build/fonts/Graphik-Regular.6961b406.woff') format("woff");font-weight:400;font-style:normal;font-display:swap}@font-face{font-family:Roboto;src:url('/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Regular.b009a76a.woff2') format("woff2"),url('/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Regular.f1e2a767.woff') format("woff");font-weight:400;font-style:normal;font-display:swap}@font-face{font-family:Roboto;src:url('/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Medium.f25d774e.woff2') format("woff2"),url('/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Medium.48af7707.woff') format("woff");font-weight:500;font-style:normal;font-display:swap}@font-face{font-family:Roboto;src:url('/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Bold.227c9319.woff2') format("woff2"),url('/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Bold.77ecb942.woff') format("woff");font-weight:700;font-style:normal;font-display:swap}@font-face{font-family:Roboto;src:url('/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Black.2e8becfc.woff2') format("woff2"),url('/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Black.f5677eb2.woff') format("woff");font-weight:900;font-style:normal;font-display:swap}h1{margin:10px 0;font-weight:500}.site-header .site-header__nav .megamenu-wrap p img{vertical-align:middle;margin:0 3px}@media (max-width:991px){.btn-main{min-width:250px}.container{padding-left:30px;padding-right:30px}body{font-size:16px;line-height:24px}h1{font-size:40px;letter-spacing:-.2px}h1{line-height:1.25em}ul{padding:0 0 0 18px}.site-footer .site-footer__top .u-flex-column p{margin-top:0}.site-footer .site-footer__top .u-flex-column p:last-child{margin-bottom:0}.site-main{font-size:16px;line-height:23px}}@media (max-width:767px){.glossary ul.glossary__index{max-width:400px}.glossary h1{font-size:26px}}@font-face{font-family:FontAwesome;src:url('/wp-content/themes/malwarebytes/assets/library/css/../fonts/fontawesome-webfont.eot?v=4.7.0');src:url('/wp-content/themes/malwarebytes/assets/library/css/../fonts/fontawesome-webfont.eot?#iefix&v=4.7.0') format('embedded-opentype'),url('/wp-content/themes/malwarebytes/assets/library/css/../fonts/fontawesome-webfont.woff2?v=4.7.0') format('woff2'),url('/wp-content/themes/malwarebytes/assets/library/css/../fonts/fontawesome-webfont.woff?v=4.7.0') format('woff'),url('/wp-content/themes/malwarebytes/assets/library/css/../fonts/fontawesome-webfont.ttf?v=4.7.0') format('truetype'),url('/wp-content/themes/malwarebytes/assets/library/css/../fonts/fontawesome-webfont.svg?v=4.7.0#fontawesomeregular') format('svg');font-weight:400;font-style:normal}:root{--wp-admin-theme-color:#007cba;--wp-admin-theme-color--rgb:0,124,186;--wp-admin-theme-color-darker-10:#006ba1;--wp-admin-theme-color-darker-10--rgb:0,107,161;--wp-admin-theme-color-darker-20:#005a87;--wp-admin-theme-color-darker-20--rgb:0,90,135;--wp-admin-border-width-focus:2px;--wp-block-synced-color:#7a00df;--wp-block-synced-color--rgb:122,0,223}:root{--wp--preset--font-size--normal:16px;--wp--preset--font-size--huge:42px}.screen-reader-text{clip:rect(1px,1px,1px,1px);word-wrap:normal!important;border:0;-webkit-clip-path:inset(50%);clip-path:inset(50%);height:1px;margin:-1px;overflow:hidden;padding:0;position:absolute;width:1px}.glossary .glossary__hero{display:flex;align-items:center;justify-content:center;flex-wrap:wrap;min-height:525px;padding:0 30px}.glossary h2{font-size:33px;margin:75px 0 24px}.glossary h3{font-size:24px;margin:0 0 24px}.glossary ul.glossary__index{list-style:none;display:flex;justify-content:center;gap:15px;padding:25px 0;flex-wrap:wrap;max-width:710px}.glossary ul.glossary__index a{color:#fff}.glossary .glossary__content{padding:35px 0 49px;text-align:left}.glossary .back-to-top{display:none;position:fixed;top:144px;left:50%;transform:translateX(-50%);box-shadow:0 13px 19px 0 rgba(0,0,0,.3);min-width:auto}@media (max-width:767px){.glossary h1{font-size:26px}.glossary h2{font-size:20px}.glossary h3{font-size:16px}.glossary ul.glossary__index{max-width:400px}}.glossary .glossary__hero{display:flex;align-items:center;justify-content:center;flex-wrap:wrap;min-height:525px}.glossary .glossary__hero a{font-size:20px;font-weight:200}.glossary h1{text-align:center;text-transform:uppercase;font-weight:500;font-size:80px;margin:0 0 10px;color:#fff}.glossary h2{margin:45px 0 24px!important;color:#000!important}.glossary h2{font-size:33px;font-family:Graphik;font-weight:700;line-height:33px}.glossary h3{font-size:24px;margin:0 0 24px;font-family:Graphik;line-height:31px}.glossary p:not(.btn-main){font-size:16px;margin:13px 0;font-weight:300}.glossary ul.glossary__index{list-style:none;display:flex;justify-content:center;gap:15px;padding:25px 0}.glossary ul.glossary__index a{color:#fff;text-decoration:none}.glossary .glossary__content{padding:35px 0 49px}.glossary .back-to-top{display:none;position:fixed;top:144px;left:50%;transform:translateX(-50%);box-shadow:0 13px 19px 0 rgba(0,0,0,.3)}.glossary .back-to-top::before{content:"";display:inline-block;vertical-align:middle;margin:-2px 5px 0 0;font-family:fontawesome}@media (max-width:1199px){.glossary h1{font-size:60px}}#overlay-lang .close .first,#overlay-lang .close .second{width:0%;position:absolute;left:0;transform:rotate(0);top:50%;left:50%;height:1px;background:#fff}@media (max-width:1149px){.site-main{padding-top:51.8281px}.site-header{box-shadow:none}.site-header .site-header__branding{position:relative;z-index:11;padding-top:24px}.site-header .site-header__top{display:none}.site-header .site-header__bottom{height:auto}.site-header .site-header__bottom:before{background-color:#fff;position:absolute;top:0;width:100vw;height:70px;box-shadow:0 5px 10px 0 rgba(0,0,0,.15);z-index:7;content:"";left:0}.site-header .site-header__bottom .site-header-searchbox:not(.active) .searchbox-nav{display:none}.site-header .site-header__nav .megamenu-wrap>.wp-block-columns>.wp-block-column:not(:empty)>*{padding-left:25px;padding-right:25px}.site-header .site-header__nav .megamenu-wrap>.wp-block-columns>.wp-block-column:first-child:empty+.wp-block-column>:first-child:not(.has-background),.site-header .site-header__nav .megamenu-wrap>.wp-block-columns>.wp-block-column:first-child>:first-child:not(.has-background){padding-top:0}.site-header .site-header__nav{position:absolute;top:0;left:0;right:0;transform:translateY(-100%);z-index:6;background-color:#fff;visibility:hidden;opacity:0;height:100vh;margin:0;padding-top:70px;display:block;overflow:hidden;overflow-y:scroll}.site-header .site-header__nav ul.primary-menu{gap:0;margin-top:25px}.site-header .site-header__nav ul.primary-menu>li{display:inline-block;width:100%}.site-header .site-header__nav ul.primary-menu>li>a{font-size:18px;font-weight:500;line-height:26px;margin:0;padding:8px 30px 8px 23px;display:inline-block;width:calc(100% - 10px)}.site-header .site-header__nav ul.primary-menu>li.menu-item-has-megamenu{height:100%;background:#fff}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap{visibility:hidden;opacity:0;right:0;position:absolute;top:0;width:100%;transform:translateX(100%);z-index:1}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns{flex-wrap:wrap!important}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns{gap:0;margin-bottom:0}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns .wp-block-column{flex-basis:100%!important}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns .wp-block-column.has-background>*{background:rgba(132,148,193,.15);max-height:100vh;height:100%}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns .wp-block-column:not(:last-child){border-bottom:1px solid #d3d9e9}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns .wp-block-column:empty{display:none}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns .wp-block-column .flex-direction-row{flex-direction:column;flex-wrap:wrap}.site-header .site-header__nav .megamenu-wrap>.wp-block-columns>.wp-block-column>p{padding:10px 15px 10px 23px!important}.site-header .site-header__nav .megamenu-wrap>.wp-block-columns>.wp-block-column>p{display:block;font-size:18px;font-weight:500;line-height:26px;margin:0;color:#082882}.site-header .menu-toggle{display:block;top:12px}.site-header .site-header__actions{justify-content:flex-start;padding:15px;padding-left:23px;padding-bottom:20px;border-bottom:1px solid #cecece;margin-bottom:0}.site-header .site-header__nav .megamenu-wrap{background-color:#fff;padding-top:83px;height:100vh;box-sizing:border-box;overflow-y:auto}}@media (max-width:991px){.btn-main{min-width:250px}.container{padding-left:30px;padding-right:30px}body{font-size:16px;line-height:24px}h1{font-size:40px;letter-spacing:-.2px}h2{font-size:30px}h3{font-size:24px}h1,h2,h3{line-height:1.25em}ul{padding:0 0 0 18px}.site-main{font-size:16px;line-height:23px}.site-main .entry-content [class*=wp-block-malware-bytes] h2{margin:0}}@media (max-width:767px){.glossary h1{font-size:26px}.glossary h2{font-size:20px}.glossary h3{font-size:16px}}.u-flex-direction-column{flex-direction:column}.u-flex-columns{display:flex;flex-wrap:wrap;margin:0 -15px}.u-flex-column{width:100%;padding:0 15px}.u-flex-col-3{width:25%}.u-flex-col-9{width:75%}.btn-main{font-size:16px;min-width:100px;text-align:center;color:#fff;display:inline-flex;justify-content:center;align-items:center;font-weight:600;border:1px solid transparent;background-color:#0d3ecc;word-break:break-word;text-decoration:none;position:relative;padding:8px 20px;margin:0;border-radius:50px;line-height:normal;letter-spacing:-.3px;font-family:Graphik,"Helvetica Neue",Helvetica,Arial,sans-serif}.btn-main.btn-primary-white{background-color:#fff;color:#0d3ecc}.btn-main.btn-primary-yellow{background-color:#efc148;color:#0d3ecc}.container{width:100%;max-width:1200px;margin-right:auto;margin-left:auto;padding-left:15px;padding-right:15px}.u-flex-center{display:flex;justify-content:center;align-items:center;flex-wrap:wrap;gap:20px}.u-text-transform-upper{text-transform:uppercase!important}.site-main article ul li{margin-top:13px}body{margin:0;overflow-x:hidden;font-family:Roboto,sans-serif;font-size:18px;line-height:26px;font-weight:400}h1,h2,h3{margin:10px 0;font-weight:500}h1{font-size:54px;font-weight:900;line-height:60px;letter-spacing:-.4px}h2{font-size:48px;font-weight:700;line-height:60px;color:#082882}h3{font-size:32px;font-weight:700;line-height:36.8px;letter-spacing:.2px}*{box-sizing:border-box;scroll-behavior:smooth}article,header,main,nav,section{display:block}a,a:-webkit-any-link,a:visited{text-decoration:none}a{color:#0d3ecc}img{max-width:100%;height:auto}p{margin:13px 0}button,input{color:inherit;font:inherit;margin:0}input[type=search]{padding:8px;flex-grow:1;min-width:3em;border:1px solid #949494;font-size:inherit;font-family:inherit;line-height:inherit}input[type=submit]{background:#f7f7f7;border:1px solid #ccc;padding:8px .625em;color:#32373c;margin-left:.625em;word-break:normal;font-size:inherit;font-family:inherit;line-height:inherit}ul{padding:0 0 0 40px}.site-main{padding-top:101px}.site-header{position:fixed;top:0;left:0;right:0;z-index:200;box-shadow:0 5px 10px 0 rgba(0,0,0,.15);background-color:#fff;font-family:Graphik,"Helvetica Neue",Helvetica,Arial,sans-serif}.site-header .btn-main{font-family:Roboto,sans-serif}.site-header strong{font-weight:600}.site-header ul{list-style-type:none;margin:0;padding:0}.site-header .site-header-searchbox{position:relative;margin:0 18px}.site-header .site-header-searchbox>button{font-size:0;background:url(data:image/svg+xml;base64,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) center no-repeat;border:0;-webkit-appearance:none;-moz-appearance:none;appearance:none;padding:0;width:18px;height:18px}.site-header .site-header-searchbox .search-modal{position:absolute;opacity:0;visibility:hidden;right:0;top:100%;width:412px}.site-header .site-header-searchbox .search-modal>label{color:#3d3d3d;font-family:Graphik,"Helvetica Neue",Helvetica,Arial,sans-serif;font-size:15px;font-style:normal;font-weight:500;line-height:20px;margin-bottom:10px;display:block}.site-header .site-header-searchbox .search-modal .search-form{display:flex;width:100%;align-items:center}.site-header .site-header-searchbox .search-modal .search-form>label{width:100%}.site-header .site-header-searchbox .search-modal .search-form input[type=submit]{font-size:0;background:url(data:image/svg+xml;base64,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) center no-repeat;border:0;-webkit-appearance:none;-moz-appearance:none;appearance:none;padding:0;width:33px;height:33px;margin-left:10px}.site-header .site-header-searchbox .search-modal .search-form input[type=search]{border-radius:4px;border:1px solid #a9a9a9;height:40px;width:100%;padding:10px}.site-header .site-header-searchbox .search-modal .search-form input[type=search]::-moz-placeholder{font-weight:400;color:#3d3d3d;letter-spacing:-.3px}.site-header .site-header-searchbox .searchbox-nav-mobile{font-size:14px;font-style:normal;font-weight:600;line-height:normal;letter-spacing:.5px;text-transform:uppercase;height:auto;width:auto;background-position:6px;padding-left:29px;background-image:url(data:image/svg+xml;base64,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)}.site-header .site-header__top ul{justify-content:flex-end}.site-header .site-header__top ul li{padding:5px 0}.site-header .site-header__top ul li a{color:#8494c1;font-size:10px;letter-spacing:.5px;text-transform:uppercase;font-weight:600;text-decoration:none}.site-header .site-header__top .secondary-menu>.menu-item{position:relative}.site-header .site-header__top .secondary-menu>.menu-item>.sub-menu{box-shadow:0 4px 4px 0 rgba(0,0,0,.25);position:absolute;top:101%;right:0;visibility:hidden;opacity:0;min-width:210px;max-width:278px;max-height:80vh;padding:24px;background-color:#fff}.site-header .site-header__top .secondary-menu>.menu-item>.sub-menu li{line-height:0}.site-header .site-header__top .secondary-menu>.menu-item>.sub-menu li a{color:#3d3d3d;font-size:15px;font-style:normal;font-weight:400;line-height:20px;text-transform:none}.site-header .site-header__top .secondary-menu>.menu-item>.sub-menu li:not(:last-child){margin-bottom:5px}.site-header .site-header__bottom{align-items:center}.site-header .site-header__nav ul li>a{display:inline-block;color:#082882;font-size:16px;text-decoration:none}.site-header .site-header__nav .megamenu-wrap>.wp-block-columns>.wp-block-column>p{display:none}.site-header .site-header__nav .megamenu-wrap>.wp-block-columns>.wp-block-column:not(:empty){background-color:#fff}.site-header .site-header__nav .megamenu-wrap>.wp-block-columns>.wp-block-column:not(:empty)>*{padding:20px 5px;z-index:1;position:relative;margin-top:0}.site-header .site-header__nav .megamenu-wrap>.wp-block-columns>.wp-block-column:empty{opacity:0}.site-header .site-header__nav .megamenu-wrap p img,.site-header .site-header__nav .megamenu-wrap p svg{vertical-align:middle;margin:0 3px}.site-header .menu-toggle{display:none;z-index:9;position:relative;background-color:rgba(0,0,0,0);border:none;margin-left:auto;padding:0;width:26px;height:36px}.site-header .menu-toggle .menu-toggle-bar{width:26px;height:2px;background-color:#082882;display:block;margin:7px 0}.site-header .site-header__actions{display:flex;justify-content:center;align-items:center;flex-wrap:wrap;gap:15px;margin-bottom:9px}.site-footer .site-footer__top p.address-text.hidden{display:none}.site-main{padding-top:101px;font-size:18px;line-height:26px;color:#3d3d3d}.site-main .entry-content [class*=wp-block-malware-bytes] h2{margin:-10px 0 0}#overlay-lang.overlay{position:fixed;width:100vw;height:100%;overflow:hidden;background-color:rgba(8,12,23,.97);z-index:99999999;overflow-y:scroll;top:0;display:none}#overlay-lang.overlay .wrap{overflow-y:scroll;width:100vw;height:100vh;position:absolute;top:0;left:0;padding-top:70px}#overlay-lang.overlay .wrap .container{max-width:100%;width:272px}#overlay-lang.overlay .wrap .container .center-row{text-align:center}#overlay-lang.overlay .wrap .container .center-row p{margin:13px auto}#overlay-lang.overlay .wrap .container .center-row p.h2{font-size:28px;color:#fff;line-height:41px}#overlay-lang.overlay .wrap .container .center-row ul{padding:0;margin:0;list-style:none;text-align:center;display:block}#overlay-lang .close{position:fixed;right:40px;top:20px;width:30px;height:30px;opacity:1}#overlay-lang .close .first,#overlay-lang .close .second{width:0;position:absolute;left:0;transform:rotate(0);top:50%;left:50%;height:1px;background:#fff}@media (min-width:480px){#overlay-lang.overlay .wrap .container{width:432px}#overlay-lang.overlay .wrap .container .center-row p.h2{font-size:33px}}@media (min-width:768px){#overlay-lang.overlay .wrap .container .center-row p.h2{font-size:32px}}@media (min-width:992px){.u-flex-col-lg-3{width:25%}.u-flex-col-lg-9{width:75%}#overlay-lang.overlay .wrap .container{width:752px}}@media (min-width:1150px){.site .u-display-none\@min-1150{display:none}.site-header .site-header__branding{width:20%}.site-header .site-header__bottom-right{width:80%}.site-header .site-header__top{display:flex;justify-content:flex-end;align-items:center}.site-header .site-header__top{position:relative;z-index:1}.site-header .site-header__top .secondary-menu>.menu-item:last-child>.sub-menu{min-width:288px}.site-header .site-header__bottom .site-header-searchbox{display:none}.site-header .site-header__nav .megamenu-wrap>.wp-block-columns>.wp-block-column:not(:empty)>*{padding:20px 30px}.site-header .site-header__nav .megamenu-wrap>.wp-block-columns>.wp-block-column:not(:empty){box-shadow:6px 6px 13px 0 rgba(8,40,130,.13),inset 0 14px 12px -13px rgba(0,0,0,.2)}.site-header .site-header__nav .megamenu-wrap>.wp-block-columns .wp-block-group{gap:10px}.site-header .site-header__nav{display:flex;flex-wrap:wrap;align-items:center;justify-content:flex-end;-moz-column-gap:57px;column-gap:57px}.site-header .site-header__nav ul.primary-menu{position:relative;justify-content:flex-end;gap:20px 24px}.site-header .site-header__nav ul.primary-menu>li>a{line-height:26px;font-weight:500;padding:13px 0 21px;border-bottom:2px solid transparent}.site-header .site-header__nav ul.primary-menu>li:last-child{margin-right:0}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap{position:absolute;top:100%;left:0;right:0;visibility:visible;opacity:0;transform:translate(-20%,-200%);width:200%;max-height:80vh;padding:0 15px}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns{gap:0;margin:0 -15px}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns .wp-block-column{overflow:auto;max-height:80vh}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns .wp-block-column:not(:last-child){border-right:1px solid #c4c4c4}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns .wp-block-column.has-background{position:relative}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns .wp-block-column.has-background>*{background:rgba(132,148,193,.15);height:100%;overflow:auto}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns .wp-block-column .flex-direction-row{flex-direction:row}}@media (min-width:1200px){#overlay-lang.overlay .wrap .container{width:944px}#overlay-lang.overlay .wrap .container .center-row p.h2{font-size:38px}}@media (max-width:1149px){.site-header{box-shadow:none}.site-header .site-header__branding{position:relative;z-index:11;padding-top:24px}.site-header .site-header__top{display:none}.site-header .site-header__bottom{height:auto}.site-header .site-header__bottom:before{background-color:#fff;position:absolute;top:0;width:100vw;height:70px;box-shadow:0 5px 10px 0 rgba(0,0,0,.15);z-index:7;content:"";left:0}.site-header .site-header__bottom .site-header-searchbox:not(.active) .searchbox-nav{display:none}.site-header .site-header__nav .megamenu-wrap>.wp-block-columns>.wp-block-column:not(:empty)>*{padding-left:25px;padding-right:25px}.site-header .site-header__nav .megamenu-wrap>.wp-block-columns>.wp-block-column:first-child:empty+.wp-block-column>:first-child:not(.has-background),.site-header .site-header__nav .megamenu-wrap>.wp-block-columns>.wp-block-column:first-child>:first-child:not(.has-background){padding-top:0}.site-header .site-header__nav{position:absolute;top:0;left:0;right:0;transform:translateY(-100%);z-index:6;background-color:#fff;visibility:hidden;opacity:0;height:100vh;margin:0;padding-top:70px;display:block;overflow:hidden;overflow-y:scroll}.site-header .site-header__nav ul.primary-menu{gap:0;margin-top:25px}.site-header .site-header__nav ul.primary-menu>li{display:inline-block;width:100%}.site-header .site-header__nav ul.primary-menu>li>a{font-size:18px;font-weight:500;line-height:26px;margin:0;padding:8px 30px 8px 23px;display:inline-block;width:calc(100% - 10px)}.site-header .site-header__nav ul.primary-menu>li.menu-item-has-megamenu{height:100%;background:#fff}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap{visibility:hidden;opacity:0;right:0;position:absolute;top:0;width:100%;transform:translateX(100%);z-index:1}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns{flex-wrap:wrap!important}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns{gap:0;margin-bottom:0}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns .wp-block-column{flex-basis:100%!important}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns .wp-block-column.has-background>*{background:rgba(132,148,193,.15);max-height:100vh;height:100%}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns .wp-block-column:not(:last-child){border-bottom:1px solid #d3d9e9}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns .wp-block-column:empty{display:none}.site-header .site-header__nav ul.primary-menu>li .megamenu-wrap .wp-block-columns .wp-block-column .flex-direction-row{flex-direction:column;flex-wrap:wrap}.site-header .site-header__nav .megamenu-wrap>.wp-block-columns>.wp-block-column>p{padding:10px 15px 10px 23px!important}.site-header .site-header__nav .megamenu-wrap>.wp-block-columns>.wp-block-column>p{display:block;font-size:18px;font-weight:500;line-height:26px;margin:0;color:#082882}.site-header .menu-toggle{display:block;top:12px}.site-header .site-header__actions{justify-content:flex-start;padding:15px;padding-left:23px;padding-bottom:20px;border-bottom:1px solid #cecece;margin-bottom:0}.site-header .site-header__nav .megamenu-wrap{background-color:#fff;padding-top:83px;height:100vh;box-sizing:border-box;overflow-y:auto}.site-main{padding-top:51.8281px}}@media (max-width:991px){.btn-main{min-width:250px}.container{padding-left:30px;padding-right:30px}body{font-size:16px;line-height:24px}h1{font-size:40px;letter-spacing:-.2px}h2{font-size:30px}h3{font-size:24px}h1,h2,h3{line-height:1.25em}ul{padding:0 0 0 18px}.site-footer .site-footer__top .u-flex-column p{margin-top:0}.site-footer .site-footer__top .u-flex-column p:last-child{margin-bottom:0}.site-main{font-size:16px;line-height:23px}.site-main .entry-content [class*=wp-block-malware-bytes] h2{margin:0}}@media (max-width:767px){.entry-content{text-align:center}ul{text-align:left}ul{margin-left:auto;margin-right:auto;display:table}#overlay-lang .close{top:35px;margin-top:20px}}:root{--swiper-theme-color:#007aff}:root{--swiper-navigation-size:44px}:root{--jp-carousel-primary-color:#fff;--jp-carousel-primary-subtle-color:#999;--jp-carousel-bg-color:#000;--jp-carousel-bg-faded-color:#222;--jp-carousel-border-color:#3a3a3a}:root{--jetpack--contact-form--border:1px solid #8c8f94;--jetpack--contact-form--border-color:#8c8f94;--jetpack--contact-form--border-size:1px;--jetpack--contact-form--border-style:solid;--jetpack--contact-form--border-radius:0px;--jetpack--contact-form--input-padding:16px;--jetpack--contact-form--font-size:16px}.screen-reader-text{clip:rect(1px,1px,1px,1px);word-wrap:normal!important;border:0;clip-path:inset(50%);height:1px;margin:-1px;overflow:hidden;padding:0;position:absolute!important;width:1px}.menu-links .menu-links__title{color:#0d3ecc;font-size:18px;line-height:26px;font-weight:500;margin-top:0;word-wrap:normal;word-break:normal}.menu-links .menu-links__title a{text-decoration:none}.menu-links ul{margin:0;padding:0;list-style-type:none}.menu-links ul li{font-weight:400;font-size:15.75px;color:#191919;margin:15px 0}.menu-links ul li a{color:#191919}.menu-links .menu-links__desc{margin:0 0 5px;font-size:15.25px;line-height:20px;color:#082882}.menu-links .menu-links__desc a{text-decoration:none}.menu-links .menu-links__desc img{vertical-align:middle;margin:0 3px}.menu-links .menu-links__cta a{padding-right:44px;color:#0d3ecc;font-weight:500;font-size:18px;background:url(data:image/svg+xml;base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz4KPHN2ZyB2ZXJzaW9uPSIxLjEiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgdmlld0JveD0iMCAwIDQwIDE2IiBmaWxsPSIjMGQzZWNjIj4KICAgIDxwYXRoCiAgICAgICAgZD0iTTM3LjE5MDE4MjMsNi42NTMxMjEwMyBMMi42MTEzOTgwOSw2LjUyMTIzMjM2IEw4LjIzMzM4OTc2LDEuMjIyNDY4MzMgQzguNTMwMTk2NjQsMC45NDI5NTk4MzYgOC41MzAxOTY2NCwwLjQ4OTMxNTMyNSA4LjIzMzM4OTc2LDAuMjA5ODA2ODI3IEM3LjkzNjU4Mjg3LC0wLjA2OTkzNTYwOSA3LjQ1NTc1NzE0LC0wLjA2OTkzNTYwOSA3LjE1ODk1NTMyLDAuMjA5ODA2ODI3IEwwLjMyMjU5MDE5MSw2LjY1MzEyMTAzIEMwLjEyNzkzMzgyNyw2Ljc4Mjc5NDQ1IDAsNi45OTU1NzMyNCAwLDcuMjM3MzY5OTQgQzAsNy4yNDEwNDEzNCAwLjAwMTA4NDAxMzI3LDcuMjQ0NDUwMTUgMC4wMDExNDQ3OTkwNiw3LjI0ODEyMTU1IEMwLjAwMTA1MzYyMDM3LDcuMjU1OTYwODcgMC4wMDM0MDQwMDQyOCw3LjI2MzM2MDk2IDAuMDAzNjE2NzU0NTQsNy4yNzEyMDAyOCBDMC4wMDcxNDIzMzA0LDcuMzQxMjI0MjEgMC4wMjE2MDkzNDg2LDcuNDA4MDM5ODQgMC4wNDQ5NTEwOTIyLDcuNDcxMzg5MzggQzAuMDU4NjQ4MTU3LDcuNTExNjAyODkgMC4wNzgzNDI3NTMyLDcuNTQ3ODgyNDIgMC4wOTk3Njk3NDQ0LDcuNTg1NzYxMzIgQzAuMTE4OTY3OTIzLDcuNjE3OTMwMjIgMC4xNDAyNDI5NSw3LjY0ODM4MDM5IDAuMTY0MjYzNDY4LDcuNjc3MjU5ODMgQzAuMTg1NjYwMDY3LDcuNzA0MDk1ODkgMC4xOTY2NjIyOTUsNy43MzU1OTY0IDAuMjIyNjAyNjMxLDcuNzYwMDE2NjkgTDcuMjA5MTU5MzEsMTQuMzQ0ODkyMiBDNy4zNTc1NjI3NiwxNC40ODQ3NjM0IDcuNTUxOTcwOTEsMTQuNTU0Njk2NiA3Ljc0NjM3OTA3LDE0LjU1NDY5NjYgQzcuOTQwNzg3MjIsMTQuNTU0Njk2NiA4LjEzNTE5NTM4LDE0LjQ4NDc2MzQgOC4yODM1OTg4MiwxNC4zNDQ4OTIyIEM4LjU4MDQwNTcsMTQuMDY1MTQ5OCA4LjU4MDQwNTcsMTMuNjExOTY4MyA4LjI4MzU5ODgyLDEzLjMzMjIzMDcgTDIuNTc2NzcwNDUsNy45NTM1MDc1MiBMMzcuMTkwMTgyMyw3Ljk1MzUwNzUyIEMzNy42MDk2NjUsNy45NTM1MDc1MiAzOCw3LjY3Mjk0NzQ5IDM4LDcuMjc3MzQ4MzIgQzM4LDYuODgxNzQ5MTQgMzcuNjA5NjY1LDYuNjUzMTIxMDMgMzcuMTkwMTgyMyw2LjY1MzEyMTAzIFoiCiAgICAgICAgaWQ9IlBhdGgxIiBzdHJva2Utd2lkdGg9IjAuNSIgZmlsbC1ydWxlPSJub256ZXJvIgogICAgICAgIHRyYW5zZm9ybT0idHJhbnNsYXRlKDE5LjAwMDAwMCwgNy4yNzczNDgpIHNjYWxlKC0xLCAxKSB0cmFuc2xhdGUoLTIwLjAwMDAwMCwgLTcuMjc3MzQ4KSI+CiAgICA8L3BhdGg+Cjwvc3ZnPg==) right 6px center no-repeat rgba(0,0,0,0);background-size:30px;font-family:Graphik,"Helvetica Neue",Helvetica,Arial,sans-serif;text-decoration:none}.menu-links.has-item-border .menu-links__item:not(:first-child){margin:10px 0 0;padding:10px 0 0;border-top:1px solid #d3d9e9}.menu-links.has-item-border .menu-links__item .menu-links__title+.menu-links__cta{margin-top:32px}.menu-links.layout-1.has-item-border .menu-links__item:not(:first-child){margin:20px 0 0;padding:20px 0 0}.menu-links.layout-2.has-item-border .menu-links__item:not(:first-child){margin:20px 0 0;padding:20px 0 0}.menu-links.with-svg .menu-links__item{margin:20px 0 0;padding:20px 0;border-top:1px solid #d3d9e9}.menu-links.with-svg .menu-links__desc a{font-weight:500}.menu-links.with-svg .menu-links__desc a svg{vertical-align:middle;margin:0 3px}@media (max-width:1149px){.menu-links .menu-links__title{font-size:18px}}.wp-block-separator{border:1px solid;border-left:none;border-right:none}.wp-block-separator{border:none;border-bottom:2px solid;margin-left:auto;margin-right:auto}.wp-block-separator.has-alpha-channel-opacity{opacity:1}.wp-block-separator.has-background:not(.is-style-dots){border-bottom:none;height:1px}.wp-block-group{box-sizing:border-box}.wp-block-columns{align-items:normal!important;box-sizing:border-box;display:flex;flex-wrap:wrap!important}@media (min-width:782px){.wp-block-columns{flex-wrap:nowrap!important}}@media (max-width:781px){.wp-block-columns:not(.is-not-stacked-on-mobile)>.wp-block-column{flex-basis:100%!important}}@media (min-width:782px){.wp-block-columns:not(.is-not-stacked-on-mobile)>.wp-block-column{flex-basis:0;flex-grow:1}.wp-block-columns:not(.is-not-stacked-on-mobile)>.wp-block-column[style*=flex-basis]{flex-grow:0}}.wp-block-column{flex-grow:1;min-width:0;overflow-wrap:break-word;word-break:break-word}body{--wp--preset--color--black:#000000;--wp--preset--color--cyan-bluish-gray:#abb8c3;--wp--preset--color--white:#ffffff;--wp--preset--color--pale-pink:#f78da7;--wp--preset--color--vivid-red:#cf2e2e;--wp--preset--color--luminous-vivid-orange:#ff6900;--wp--preset--color--luminous-vivid-amber:#fcb900;--wp--preset--color--light-green-cyan:#7bdcb5;--wp--preset--color--vivid-green-cyan:#00d084;--wp--preset--color--pale-cyan-blue:#8ed1fc;--wp--preset--color--vivid-cyan-blue:#0693e3;--wp--preset--color--vivid-purple:#9b51e0;--wp--preset--color--blue:#0D3ECC;--wp--preset--color--navy-blue:#1C284C;--wp--preset--color--secondary-black:#191919;--wp--preset--color--dark-blue:#082882;--wp--preset--color--sky-blue:#009DEB;--wp--preset--color--baby-blue:#8DCFFD;--wp--preset--color--yellow:#EFC148;--wp--preset--color--pink:#E74488;--wp--preset--color--ruby:#A02A5C;--wp--preset--color--charcoal:#3D3D3D;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple:linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan:linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange:linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red:linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray:linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum:linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple:linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux:linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk:linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean:linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass:linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight:linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small:13px;--wp--preset--font-size--medium:20px;--wp--preset--font-size--large:36px;--wp--preset--font-size--x-large:42px;--wp--preset--spacing--20:0.44rem;--wp--preset--spacing--30:0.67rem;--wp--preset--spacing--40:1rem;--wp--preset--spacing--50:1.5rem;--wp--preset--spacing--60:2.25rem;--wp--preset--spacing--70:3.38rem;--wp--preset--spacing--80:5.06rem;--wp--preset--shadow--natural:6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep:12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp:6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined:6px 6px 0px -3px rgba(255, 255, 255, 1),6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp:6px 6px 0px rgba(0, 0, 0, 1)}body{margin:0;--wp--style--global--content-size:1200px;--wp--style--global--wide-size:1200px}.has-global-padding{padding-right:var(--wp--style--root--padding-right);padding-left:var(--wp--style--root--padding-left)}body{--wp--style--block-gap:24px}body .is-layout-flex{display:flex}body .is-layout-flex{flex-wrap:wrap;align-items:center}body .is-layout-flex>*{margin:0}body{--wp--style--root--padding-top:0px;--wp--style--root--padding-right:0px;--wp--style--root--padding-bottom:0px;--wp--style--root--padding-left:0px}.has-white-background-color{background-color:var(--wp--preset--color--white)!important}.wp-container-content-1{flex-basis:1px}.wp-container-2.wp-container-2,.wp-container-4.wp-container-4{flex-direction:column;align-items:stretch}.wp-container-12.wp-container-12,.wp-container-16.wp-container-16,.wp-container-20.wp-container-20,.wp-container-24.wp-container-24,.wp-container-28.wp-container-28,.wp-container-7.wp-container-7{flex-wrap:nowrap} </style> <link rel="preload" as="style" onload="this.onload=null;this.rel='stylesheet'" href='https://www.malwarebytes.com/_static/??-eJyNjEEKgDAMwD6kFlFRD+JbullxsG6yVsZ+7/yBx0ASyHdrY1AKCnoRkwCjz5jIFK2AIqQC5nH+AINCnRVp4F/lnUmYCtQEzqq3mEkiU8cufJ+dt34e+nGYpnV5AVrPMxU=' type='text/css' media='all' /> <noscript><link rel='stylesheet' href='https://www.malwarebytes.com/_static/??-eJyNjEEKgDAMwD6kFlFRD+JbullxsG6yVsZ+7/yBx0ASyHdrY1AKCnoRkwCjz5jIFK2AIqQC5nH+AINCnRVp4F/lnUmYCtQEzqq3mEkiU8cufJ+dt34e+nGYpnV5AVrPMxU='> </noscript><style id='kadence-blocks-global-variables-inline-css'> :root {--global-kb-font-size-sm:clamp(0.8rem, 0.73rem + 0.217vw, 0.9rem);--global-kb-font-size-md:clamp(1.1rem, 0.995rem + 0.326vw, 1.25rem);--global-kb-font-size-lg:clamp(1.75rem, 1.576rem + 0.543vw, 2rem);--global-kb-font-size-xl:clamp(2.25rem, 1.728rem + 1.63vw, 3rem);--global-kb-font-size-xxl:clamp(2.5rem, 1.456rem + 3.26vw, 4rem);--global-kb-font-size-xxxl:clamp(2.75rem, 0.489rem + 7.065vw, 6rem);}:root {--global-palette1: #3182CE;--global-palette2: #2B6CB0;--global-palette3: #1A202C;--global-palette4: #2D3748;--global-palette5: #4A5568;--global-palette6: #718096;--global-palette7: #EDF2F7;--global-palette8: #F7FAFC;--global-palette9: #ffffff;} </style> <script type="text/javascript" src="https://www.malwarebytes.com/wp-content/plugins/weglot/dist/front-js.js?m=1731435598g" ></script><link rel="https://api.w.org/" href="https://www.malwarebytes.com/wp-json/" /><link rel="alternate" type="application/json" href="https://www.malwarebytes.com/wp-json/wp/v2/pages/515" /><link rel='shortlink' href='https://www.malwarebytes.com/?p=515' /> <link rel="alternate" type="application/json+oembed" href="https://www.malwarebytes.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.malwarebytes.com%2Fglossary" /> <link rel="alternate" type="text/xml+oembed" href="https://www.malwarebytes.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.malwarebytes.com%2Fglossary&#038;format=xml" /> <style>img#wpstats{display:none}</style> <link rel="icon" href="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/08/cropped-favicon-512x512-1-1.png?w=32" sizes="32x32" /> <link rel="icon" href="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/08/cropped-favicon-512x512-1-1.png?w=192" sizes="192x192" /> <link rel="apple-touch-icon" href="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/08/cropped-favicon-512x512-1-1.png?w=180" /> <meta name="msapplication-TileImage" content="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/08/cropped-favicon-512x512-1-1.png?w=270" /> <style id="wp-custom-css"> @media (min-width: 1150px) { .site-header.mb-header-pricing .site-header__nav ul.primary-menu > li:not(:nth-child(3)) .megamenu-wrap { transform: translate(-42%, -200%); } .site-header.mb-header-pricing .site-header__nav ul.primary-menu > li:not(:nth-child(3)).active .megamenu-wrap { transform: translate(-42%, 0); } } </style> <meta name="apple-itunes-app" content="app-id=1327105431, affiliate-data=, app-argument="> <meta name="facebook-domain-verification" content="cmdpjevu8l4zya3vzr1p6f00v21uty" /> <!-- GTM --> <script type="text/javascript">(function (w, d, s, l, i) { w[l] = w[l] || []; w[l].push({ 'gtm.start': new Date().getTime(), event: 'gtm.js' }); var f = d.getElementsByTagName(s)[0], j = d.createElement(s), dl = l != 'dataLayer' ? '&l=' + l : ''; j.async = true; j.src = '//www.googletagmanager.com/gtm.js?id=' + i + dl; f.parentNode.insertBefore(j, f); })(window, document, 'script', 'dataLayer', 'GTM-MKSKW3'); </script> <!-- End GTM --> <script> (function () { let plausibleDataDomain = 'dev-www.malwarebytes.com'; if (location.href.indexOf('https://www.malwarebytes.com') === 0 || location.href.indexOf('https://malwarebytes.go-vip.net') === 0) { plausibleDataDomain = 'w.malwarebytes.com,malwarebytes.com'; } else if (location.href.indexOf('https://preprod-www.malwarebytes.com') === 0) { plausibleDataDomain = 'staging-www.malwarebytes.com'; } let script = document.createElement('script'); script.defer = true; script.src = 'https://plausible.io/js/script.js'; script.dataset.domain = plausibleDataDomain; document.head.appendChild(script); })(); </script> <body class="page-template-default page page-id-515 wp-custom-logo"> <div id="page" class="site"> <a class="skip-link screen-reader-text" href="#primary">Skip to content</a> <header id="masthead" class="site-header"> <div class="container"> <div class="site-header__top"> <!-- Search --> <div class="site-header-searchbox"> <button class="searchbox-nav" aria-label="Search in MalwareBytes">Search</button> <div class="search-modal"> <label>Search Malwarebytes.com</label> <div class="custom-search-form"> <form role="search" method="get" class="search-form" action="https://www.malwarebytes.com/"> <label> <span class="screen-reader-text">Search for:</span> <input type="search" class="search-field" placeholder="Type to search..." value="" name="s" /> </label> <input type="submit" class="search-submit" value="Search" /> </form> </div> </div> </div> <!-- Search --> <ul id="secondary-menu" class="secondary-menu u-flex-center"><li id="menu-item-2914" class="signin-items menu-item menu-item-type-custom menu-item-object-custom menu-item-2914"><a href="https://my.malwarebytes.com/en/login" id="cta-en-us-utilbar-my_malwarebytes_com_en_login-click">Sign In</a></li> </ul> </div> <div class="site-header__bottom u-flex-columns"> <div class="site-header__branding u-flex-column u-flex-col-lg-3 u-flex-col-9"> <a href="https://www.malwarebytes.com/" rel="home" id="cta-navbar-company-logo-en"> <svg width="178" height="28" viewBox="0 0 179 28" fill="none" xmlns="http://www.w3.org/2000/svg"> <path fill-rule="evenodd" clip-rule="evenodd" d="M116.961 7.66164V0.648703C116.961 0.48192 116.826 0.35215 116.652 0.389163L114.622 0.686163C114.487 0.686163 114.41 0.815933 114.41 0.945703V21.3705C114.41 21.5002 114.507 21.6304 114.622 21.6304C116.381 22.0198 118.585 22.187 119.958 22.187C125.776 22.187 126.568 19.5153 126.568 16.6033V11.223C126.568 8.14371 125.022 6.56729 122.026 6.56729C119.861 6.56729 118.063 7.12383 117.058 7.62463L116.961 7.66164ZM123.978 16.6961C123.978 18.7737 123.321 20.0349 120.151 20.0349C119.088 20.0349 118.044 19.9421 117.019 19.8311H116.981V9.90611H117.019C117.947 9.47934 119.88 8.75557 121.388 8.75557C123.167 8.73729 123.978 9.49762 123.978 11.149V16.6961Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M128.038 6.86377C127.864 6.86377 127.728 7.031 127.767 7.19778L132.657 21.6678C132.696 21.7976 132.793 21.8346 132.928 21.8346H133.508C133.682 21.8346 133.817 22.0014 133.779 22.1686L131.846 27.5855C131.807 27.7523 131.942 27.9195 132.116 27.9195H133.914C134.049 27.9195 134.126 27.8268 134.185 27.7523L136.35 21.8716L141.414 7.19778C141.453 7.031 141.317 6.86377 141.143 6.86377H139.21C139.075 6.86377 138.998 6.95653 138.94 7.031L134.841 19.2561C134.745 19.5157 134.397 19.5157 134.319 19.2561L130.299 7.031C130.183 6.95653 130.086 6.86377 129.97 6.86377H128.038Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M154.114 16.6773C154.114 20.4433 156.047 22.1686 160.28 22.1686C162.078 22.1686 164.069 21.8716 165.519 21.4078C165.654 21.3708 165.731 21.2411 165.694 21.1113L165.422 19.6642C165.383 19.4974 165.249 19.4047 165.074 19.46C163.354 19.8867 161.807 20.091 160.454 20.091C157.187 20.091 156.627 18.9962 156.627 16.6585V15.6012C156.627 15.434 156.762 15.3412 156.897 15.3412H165.712C165.886 15.3412 165.983 15.2114 165.983 15.0817V12.2802C165.983 8.47765 164.088 6.65953 160.126 6.65953C156.182 6.56678 154.114 8.44064 154.114 12.1505V16.6773ZM160.184 8.6449C162.561 8.6449 163.528 9.60948 163.528 11.9837V13.041C163.528 13.2078 163.393 13.3006 163.257 13.3006H156.917C156.743 13.3006 156.646 13.1708 156.646 13.041V11.9837H156.665C156.665 9.66522 157.767 8.6449 160.184 8.6449Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M170.912 10.6299C170.912 9.18277 171.318 8.68197 173.638 8.68197C174.74 8.68197 176.324 8.81174 177.658 9.07128C177.832 9.10874 177.967 8.97852 177.967 8.81174L178.103 7.32719C178.103 7.19742 178.006 7.06765 177.891 7.03064C176.653 6.73364 175.165 6.56641 173.754 6.56641C169.829 6.56641 168.38 7.6612 168.38 10.5928C168.38 13.6717 168.728 14.4507 172.613 15.3783C175.744 16.1021 175.957 16.2688 175.957 17.9942C175.957 19.6085 175.551 20.1093 172.961 20.1093C171.724 20.1093 170.139 19.9055 168.824 19.6085C168.65 19.5715 168.515 19.6455 168.476 19.8128L168.206 21.2041C168.167 21.3339 168.244 21.4637 168.38 21.5007C169.656 21.9274 171.589 22.2244 173.097 22.2244C177.639 22.2244 178.47 20.7773 178.47 17.9014C178.49 14.692 177.871 14.321 173.638 13.3006C170.989 12.6705 170.912 12.3735 170.912 10.6299Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M51.4119 7.12329C51.3732 6.95651 51.5085 6.78928 51.6829 6.78928H54.8145C54.9494 6.78928 55.0851 6.88204 55.0851 6.99352L56.7664 15.7862C56.8051 16.0837 57.211 16.0837 57.2884 15.8237L60.0141 6.97479C60.0524 6.84502 60.1494 6.771 60.2847 6.771H63.9966C64.1315 6.771 64.2085 6.86375 64.2668 6.97479L66.9925 15.8237C67.0891 16.0837 67.4758 16.0837 67.5145 15.7862L69.1958 6.99352C69.2345 6.86375 69.3315 6.78928 69.4668 6.78928H72.5984C72.772 6.78928 72.9072 6.95651 72.8685 7.12329L70.0271 21.7231C69.9884 21.8529 69.8922 21.9273 69.7565 21.9273H65.6588C65.523 21.9273 65.4456 21.8346 65.3878 21.7231L62.3919 11.9096C62.2949 11.6501 61.9469 11.6501 61.8699 11.9096L58.874 21.7231C58.8353 21.8529 58.7383 21.9273 58.603 21.9273H54.5048C54.3695 21.9273 54.273 21.8529 54.2342 21.7231L51.4119 7.12329Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M47.8359 16.8631V5.89956V1.57656C47.8359 1.40978 47.7006 1.27956 47.527 1.31702L44.1248 1.7808C43.9895 1.7808 43.9121 1.91102 43.9121 2.04079V2.17056V5.89956V17.2712C43.9121 20.7036 46.0771 22.2247 48.9764 22.2247C49.2862 22.2247 50.2915 22.1873 50.8709 22.1315C51.0062 22.1315 51.1415 22.0018 51.1415 21.872V19.4603C51.1415 19.2935 51.0062 19.2008 50.8326 19.2008C50.4459 19.145 49.9239 19.145 49.692 19.145C48.2809 19.145 47.8359 18.5515 47.8359 16.8631Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M93.687 12.1138C93.5908 12.1508 93.5521 12.2435 93.5521 12.318V21.6677C93.5521 21.8349 93.4164 21.9277 93.2811 21.9277H89.879C89.705 21.9277 89.6084 21.7975 89.6084 21.6677V7.58742C89.6084 7.45765 89.705 7.32788 89.8211 7.32788L92.6434 6.86365C92.8174 6.82664 92.9527 6.95641 92.9527 7.06789L93.088 8.03247C93.1267 8.23672 93.3585 8.32947 93.5325 8.1997C94.4217 7.64316 95.8333 6.93812 96.9734 6.54837C97.1474 6.51136 97.321 6.58583 97.321 6.75261L97.6307 9.72082C97.6885 9.90634 97.6116 9.99909 97.5145 10.0919C96.1034 10.6854 94.9633 11.316 93.687 12.1138Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M148.373 18.3841V9.20117C148.373 9.03439 148.508 8.94163 148.643 8.94163H152.355C152.491 8.94163 152.625 8.84888 152.625 8.68209L152.8 7.19799C152.8 7.03076 152.664 6.90099 152.529 6.90099H148.643C148.469 6.90099 148.373 6.77122 148.373 6.641V3.15415C148.373 2.98692 148.238 2.85671 148.064 2.89417L146.034 3.19117C145.899 3.19117 145.822 3.32049 145.822 3.45026V6.65973C145.822 6.82696 145.686 6.91972 145.551 6.91972H143.347C143.173 6.91972 143.076 7.04949 143.076 7.17926V8.66336C143.076 8.83015 143.212 8.9229 143.347 8.9229H145.551C145.725 8.9229 145.822 9.05312 145.822 9.18289V18.7551C145.822 21.1668 146.923 22.1314 149.649 22.1314C150.268 22.1314 150.886 22.0943 151.505 21.9646C151.64 21.9276 151.717 21.8348 151.717 21.705V20.2209C151.717 20.0537 151.544 19.9239 151.408 19.9609C150.905 20.0724 150.461 20.1094 150.055 20.1094C148.469 20.1094 148.373 19.4419 148.373 18.3841Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M105.672 6.3999C104.126 6.3999 102.946 6.65944 102.019 7.06793C99.8538 8.08825 99.1582 10.0732 99.1582 12.2619V16.2879C99.1582 19.8496 100.782 22.0383 105.498 22.1311H106.6C107.876 22.1311 109.209 22.0013 110.428 21.8341C110.563 21.7971 110.698 21.6677 110.64 21.538V21.4077L110.331 19.3301C109.132 19.4599 108.088 19.4973 106.89 19.4973C103.991 19.4973 103.102 18.6995 103.102 16.9929V16.4916V15.7871H111.607C111.781 15.7871 111.877 15.6568 111.877 15.5271V14.377V12.5214C111.839 10.0919 111.239 7.92102 108.939 6.95644C108.108 6.62243 107.045 6.3999 105.672 6.3999ZM108.088 13.2269H103.063V11.9092C103.063 10.4625 103.72 9.49792 105.672 9.49792C105.885 9.49792 106.117 9.49792 106.33 9.53538C107.78 9.73918 108.359 10.685 108.359 11.9092V12.9674C108.359 13.1342 108.224 13.2269 108.088 13.2269Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M12.4228 24.5059C12.5964 24.5059 12.7317 24.3694 12.7317 24.194C12.7317 24.0571 12.6351 23.8817 12.4616 23.8817H12.3645L12.1518 23.8428C8.57566 23.1404 5.92779 19.9218 5.92779 16.1565C5.92779 14.5576 6.41108 13.036 7.24193 11.8074C7.37767 11.6316 7.58994 11.4952 7.82224 11.7099L13.4669 17.4831C13.5047 17.522 13.6017 17.5806 13.6791 17.5806C13.7757 17.5806 13.8531 17.5417 13.8919 17.4831L19.5747 11.7488C19.7875 11.5341 19.9811 11.5735 20.0972 11.7877C20.9281 13.036 21.4113 14.5383 21.4113 16.1373C21.4113 18.1461 20.6575 19.9608 19.4199 21.3459C19.3816 21.3848 19.3238 21.4434 19.285 21.4824C19.285 21.5213 19.2463 21.5799 19.2463 21.6188C19.2463 21.7947 19.3816 21.9311 19.5556 21.9311H19.5943C19.633 21.9311 19.6909 21.8922 19.7296 21.8922C27.2682 18.6928 26.9207 11.1247 26.9207 11.1247C26.9207 6.8136 24.8905 2.93201 21.7593 0.493699C21.6241 0.396166 21.4113 0.396166 21.3143 0.532618L13.9114 8.10121C13.7757 8.23767 13.563 8.23767 13.4281 8.10121L5.96607 0.532618C5.83078 0.396166 5.65722 0.396166 5.52194 0.493699C2.44819 2.93201 0.418457 6.75499 0.418457 11.1247C0.418457 18.0683 5.6185 23.8034 12.3263 24.5059H12.4228Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M29.5881 6.78923C29.4528 6.82669 29.3175 6.95646 29.3753 7.08623L29.6846 9.36813C29.7233 9.4979 29.8204 9.62767 29.9935 9.62767C31.2698 9.4979 32.1011 9.46089 33.3961 9.46089C36.2954 9.46089 37.185 10.2582 37.185 11.9653V12.9861C37.185 13.1529 37.0497 13.2456 36.914 13.2456H33.2604C30.0518 13.2456 28.1382 14.8033 28.1382 17.6418C28.1382 20.2577 30.2453 22.1311 33.4352 22.1311C35.4258 22.1311 36.2188 21.8345 36.8757 21.241C37.0497 21.0738 37.359 21.2035 37.359 21.4078V21.612C37.359 21.7788 37.4943 21.8716 37.6296 21.8716H40.8381C41.0121 21.8716 41.1092 21.7418 41.1092 21.612V12.0764C41.1474 8.3108 38.4221 6.49268 33.7828 6.49268C32.4104 6.49268 30.9605 6.58543 29.5881 6.78923ZM33.7828 19.4786C32.1594 19.4786 31.3085 18.8851 31.3085 17.6605C31.3085 16.3062 32.1977 15.7496 33.7828 15.7496H36.914C37.0884 15.7496 37.185 15.8794 37.185 16.0096V16.3062H37.2233C37.2233 18.2171 35.9087 19.4786 33.7828 19.4786Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M75.2463 6.78923C75.111 6.82669 74.9757 6.95646 75.0335 7.08623L75.3428 9.36813C75.3815 9.4979 75.4781 9.62767 75.6517 9.62767C76.928 9.4979 77.7593 9.46089 79.0543 9.46089C81.9536 9.46089 82.8432 10.2582 82.8432 11.9653V12.9861C82.8432 13.1529 82.7074 13.2456 82.5722 13.2456H78.919C75.71 13.2456 73.7964 14.8033 73.7964 17.6418C73.7964 20.2577 75.9036 22.1311 79.093 22.1311C81.0836 22.1311 81.8766 21.8345 82.5334 21.241C82.7074 21.0738 83.0172 21.2035 83.0172 21.4078V21.612C83.0172 21.7788 83.1525 21.8716 83.2877 21.8716H86.4963C86.6703 21.8716 86.7673 21.7418 86.7673 21.612V12.0764C86.8635 8.3108 84.0803 6.49268 79.4406 6.49268C78.0686 6.49268 76.6187 6.58543 75.2463 6.78923ZM79.4406 19.4786C77.8171 19.4786 76.9663 18.8851 76.9663 17.6605C76.9663 16.3062 77.8554 15.7496 79.4406 15.7496H82.5722C82.7466 15.7496 82.8432 15.8794 82.8432 16.0096V16.3062H82.8815C82.8815 18.2171 81.5669 19.4786 79.4406 19.4786Z" fill="#0D3ECC"/> </svg> </a> </div> <div class="site-header__bottom-right u-flex-column u-flex-col-lg-9 u-flex-col-3"> <button class="menu-toggle" aria-label="Menu" aria-controls="primary-menu" aria-expanded="false"> <span class="menu-toggle-bar menu-toggle-bar1"></span> <span class="menu-toggle-bar menu-toggle-bar2"></span> <span class="menu-toggle-bar menu-toggle-bar3"></span> </button> <div class="site-header__nav"> <nav id="site-navigation" class="main-navigation"> <ul id="primary-menu" class="primary-menu u-flex-center"><li id="menu-item-2906" class="personal-menu-class menu-item menu-item-type-custom menu-item-object-custom menu-item-2906 menu-item-has-megamenu"><a href="#" id="cta-en-us-navbar-personal-click">Personal</a><div class="megamenu-wrap"> <div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex" style="padding-bottom:0"> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:29%"> <p>&lt; Products</p> <div class="wp-block-group alignfull is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-1 wp-block-group-is-layout-flex"> <div class="wp-block-malware-bytes-menu-links menu-links layout-1 has-item-border" id="menu-links-4ed3bf9a-9621-4f6d-8aba-9a5850ee5951"><div class="menu-links__item"><div class="menu-links__title" style="color:#0d3ecc"><strong>Computer Protection</strong></div><ul><li><a id="cta-en-us-navbar-personal-malwarebytes-premium-click" href="https://www.malwarebytes.com/premium">Premium Security ></a></li><li><a id="cta-en-us-navbar-_getprotection-click" href="https://www.malwarebytes.com/getprotection">Free Antivirus ></a></li><li><a id="cta-en-us-navbar-_getprotection-click2" href="https://www.malwarebytes.com/solutions/virus-scanner">Free Virus Scan ></a></li></ul></div><div class="menu-links__item"><div class="menu-links__title" style="color:#0d3ecc"><strong>Mobile Protection</strong></div><ul><li><a id="cta-en-us-navbar-_ios-click" href="https://www.malwarebytes.com/ios">iOS Security ></a></li><li><a id="cta-en-us-navbar-_android-click" href="https://www.malwarebytes.com/android">Android Security ></a></li></ul></div></div> </div> </div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:29%"> <div class="wp-block-group alignfull is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-2 wp-block-group-is-layout-flex"> <div class="wp-block-malware-bytes-menu-links menu-links layout-1 has-item-border" id="menu-links-4ed3bf9a-9621-4f6d-8aba-9a5850ee5951"><div class="menu-links__item"><div class="menu-links__title" style="color:#0d3ecc"><strong>Identity Protection</strong></div><ul><li><a id="cta-en-us-navbar-_identity_theft_protection-click" href="https://www.malwarebytes.com/identity-theft-protection">Identity Theft Protection ></a></li><li><a id="cta-en-us-navbar-digital-footprint-scanner-click" href="https://www.malwarebytes.com/digital-footprint">Digital Footprint Scanner ></a></li><li><a id="cta-en-us-navbar-personal-data-remover-click" href="https://www.malwarebytes.com/personal-data-remover">Personal Data Remover ></a></li></ul></div><div class="menu-links__item"><div class="menu-links__title" style="color:#0d3ecc"><strong>Privacy Protection</strong></div><ul><li><a id="cta-en-us-navbar-_vpn-click" href="https://www.malwarebytes.com/vpn" data-type="link" data-id="https://www.malwarebytes.com/vpn">VPN ></a></li><li><a id="cta-en-us-navbar-_adwcleaner-click" href="https://www.malwarebytes.com/adwcleaner">AdwCleaner ></a></li><li><a id="cta-en-us-navbar-_browserguard-click" href="https://www.malwarebytes.com/browserguard">Browser Guard ></a></li></ul></div></div> </div> </div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:37%"> <div class="wp-block-group alignfull flex-direction-row is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-3 wp-block-group-is-layout-flex"> <div class="wp-block-malware-bytes-menu-links menu-links layout-1 has-item-border" id="menu-links-d24ba127-7e50-44f9-8919-360f85d19902" style="background-color:#ffffff"><div class="menu-links__item"><p class="menu-links__desc" style="color:#135e96"><span data-fontsize="18" class="qubely-custom-font" style="font-size: 18px;"><span data="#191919" class="qubely-text-has-color" style="color: #191919;">Have a current computer infection?</span></span></p><div class="menu-links__cta" style="color:#135e96"><a id="cta-en-us-navbar-clean-your-device-now-click" href="https://dev-www.malwarebytes.com/getprotection"><strong>Clean your device now</strong></a></div></div><div class="menu-links__item"><p class="menu-links__desc" style="color:#135e96"><span data="#191919" class="qubely-text-has-color" style="color: #191919;"><span data-fontsize="18" class="qubely-custom-font" style="font-size: 18px;">Try our antivirus with a free, full-featured 14-day trial</span></span></p><div class="menu-links__cta" style="color:#135e96"><a id="cta-en-us-navbar-download-now-click" href="https://dev-www.malwarebytes.com/getprotection"><strong>Download now</strong></a></div></div><div class="menu-links__item"><p class="menu-links__desc" style="color:#135e96"><span data="#191919" class="qubely-text-has-color" style="color: #191919;"><span data-fontsize="18" class="qubely-custom-font" style="font-size: 18px;">Find the right cyberprotection for you</span></span></p><div class="menu-links__cta" style="color:#135e96"><a id="cta-en-us-navbar-see-our-plans-click" href="https://dev-www.malwarebytes.com/pricing"><strong>Compare plans and pricing</strong></a></div></div></div> </div> </div> </div> </div></li> <li id="menu-item-2907" class="business-menu-class menu-item menu-item-type-custom menu-item-object-custom menu-item-2907 menu-item-has-megamenu"><a href="#" id="cta-en-us-navbar-business-click">Business</a><div class="megamenu-wrap"> <div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-2 wp-block-columns-is-layout-flex"> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:25%"></div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:35%"> <p>&lt; Business</p> <div class="wp-block-malware-bytes-menu-links menu-links layout-1 has-item-border" id="menu-links-f01e317a-5669-417c-ae3d-5bae36e32f8c"><div class="menu-links__item"><div class="menu-links__title" style="color:#0D3ECC"><strong><a id="cta-en-us-navbar-business-teams-click" href="https://www.malwarebytes.com/teams">Teams ></a></strong></div><div class="menu-links__subtitle">Simple to manage protection for 20 or fewer devices</div></div><div class="menu-links__item"><div class="menu-links__title" style="color:#0D3ECC"><strong><a href="https://www.threatdown.com/?utm_campaign=mwb-referral&amp;utm_source=malwarebytes.com&amp;utm_medium=referral&amp;utm_content=cta-mb-nav-threatdown">ThreatDown ></a></strong></div><div class="menu-links__subtitle">Award-winning endpoint security for small and medium businesses</div></div></div> </div> </div> </div></li> <li id="menu-item-2908" class="pricing-menu-class menu-item menu-item-type-custom menu-item-object-custom menu-item-2908 menu-item-has-megamenu"><a href="#" id="cta-en-us-navbar-pricing-click">Pricing</a><div class="megamenu-wrap"> <div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-3 wp-block-columns-is-layout-flex"> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow"></div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow"> <p>&lt; Pricing</p> <div class="wp-block-malware-bytes-menu-links menu-links layout-1 has-item-border" id="menu-links-8b91929a-d4ec-4127-b3f4-08b5703b82f6"><div class="menu-links__item"><div class="menu-links__title"><a id="cta-en-us-navbar-pricing-personal-pricing-click" href="https://www.malwarebytes.com/pricing" data-type="page" data-id="3844">Personal pricing</a></div><p class="menu-links__desc">Protect your personal devices and data</p></div><div class="menu-links__item"><div class="menu-links__title"><a id="cta-en-us-navbar-pricing-small-office-home-office-pricing-click" href="https://www.malwarebytes.com/pricing/teams" data-type="page" data-id="406">Small office/home office pricing</a></div><p class="menu-links__desc">Protect your team&#8217;s devices and data</p></div><div class="menu-links__item"><div class="menu-links__title"><a id="cta-en-us-navbar-pricing-business-pricing-click" href="https://www.threatdown.com/pricing/?utm_campaign=mwb-referral&amp;utm_source=malwarebytes.com&amp;utm_medium=referral&amp;utm_content=cat-en-us-navbar-pricing-business-pricing-click" data-type="page" data-id="124">Business pricing (5+ employees)</a></div><p class="menu-links__desc">Step up your corporate endpoint security. Save up to 45%</p></div></div> </div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow"></div> </div> </div></li> <li id="menu-item-2909" class="partners-menu-class menu-item menu-item-type-custom menu-item-object-custom menu-item-2909 menu-item-has-megamenu"><a href="#" id="cta-en-us-navbar-partners-click">Partners</a><div class="megamenu-wrap"> <div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-4 wp-block-columns-is-layout-flex"> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow"></div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:30%"> <p>&lt; Partners</p> <div class="wp-block-malware-bytes-menu-links menu-links layout-1 has-item-border" id="menu-links-e13d480b-8377-4493-b67e-2fa03815fbb5"><div class="menu-links__item"><div class="menu-links__title"><br><a id="cta-navbar-partners-explore-partnerships-en-test" href="https://www.malwarebytes.com/partners">Malwarebytes</a></div><ul><li><a href="https://www.malwarebytes.com/affiliates" data-type="link" data-id="https://www.malwarebytes.com/affiliates">Affiliate partner ></a></li><li><a href="https://www.malwarebytes.com/techbench">Computer repair ></a><br></li></ul></div><div class="menu-links__item"><div class="menu-links__title"><a href="https://www.threatdown.com/partner-program/?utm_campaign=mwb-referral&amp;utm_source=malwarebytes.com&amp;utm_medium=referral&amp;utm_content=cta-navbar-partners-explore-partnerships-en-test" target="_blank" rel="noreferrer noopener">ThreatDown: Malwarebytes for Business</a></div><ul><li><a id="cta-navbar-partners-solution-providers-en-test" href="https://www.threatdown.com/partner-program/partner-reseller/?utm_campaign=mwb-referral&amp;utm_source=malwarebytes.com&amp;utm_medium=referral&amp;utm_content=cta-navbar-partners-solution-providers-en-test" target="_blank" rel="noreferrer noopener">Resellers</a> ></li><li><a id="cta-navbar-partners-managed-service-providers-en-test" href="https://www.threatdown.com/partner-program/msp/?utm_campaign=mwb-referral&amp;utm_source=malwarebytes.com&amp;utm_medium=referral&amp;utm_content=cta-navbar-partners-managed-service-providers-en-test" data-type="page" data-id="3311" target="_blank" rel="noreferrer noopener">Managed Service Providers (MSP/ISS) ></a></li></ul></div></div> </div> <div class="wp-block-column has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:34%"></div> </div> </div></li> <li id="menu-item-2910" class="resources-menu-class menu-item menu-item-type-custom menu-item-object-custom menu-item-2910 menu-item-has-megamenu"><a href="#" id="cta-en-us-navbar-resources-click">Resources</a><div class="megamenu-wrap"> <div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-5 wp-block-columns-is-layout-flex" style="padding-right:var(--wp--preset--spacing--80);padding-left:0"> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:33.33%"></div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:34.48%"> <p>&lt; Resources</p> <div class="wp-block-malware-bytes-menu-links menu-links layout-1 has-item-border" id="menu-links-d6a9ae27-5550-4478-b20f-6394817e1ef7"><div class="menu-links__item"><div class="menu-links__title"><a id="cta-en-us-navbar-_resources-learn-cybcersecurity-click" href="https://www.malwarebytes.com/blog"><img decoding="async" width="130" height="16" class="wp-image-119531" style="width: 130px;" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/07/Malwarebytes_Labs_logo_Color-2.png" alt="Malwarebytes Labs" srcset="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/07/Malwarebytes_Labs_logo_Color-2.png 159w, https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/07/Malwarebytes_Labs_logo_Color-2.png?resize=150,19 150w" sizes="(max-width: 130px) 100vw, 130px" /></a></div><ul><li><a id="cta-en-us-navbar-_antivirus-click" href="https://www.malwarebytes.com/glossary">Security terms glossary ></a></li><li><a id="cta-en-us-navbar-_malware-click" href="https://www.malwarebytes.com/blog/threats">Threat Center ></a></li><li><a href="https://www.malwarebytes.com/blog">Cybersecurity News ></a></li></ul></div><div class="menu-links__item"><ul><li><a id="cta-en-us-navbar-_glossary-click" href="https://www.malwarebytes.com/company">About Malwarebytes ></a></li><li><a id="cta-en-us-navbar-_blog_threats-click" href="https://www.malwarebytes.com/press/">Press ></a></li><li><a href="https://www.malwarebytes.com/jobs">Careers ></a></li></ul></div></div> </div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:32.19%"> <p></p> <div class="wp-block-malware-bytes-menu-links menu-links layout-1 has-item-border" id="menu-links-0a8428cf-74da-4b5d-a0ed-6cf810a8b368"><div class="menu-links__item"><div class="menu-links__title"><a id="cta-en-us-navbar-_resources-business-click" href="https://www.malwarebytes.com/cybersecurity">Cybersecurity Resource Center</a></div><ul><li><a id="cta-en-us-navbar-_resources-click" href="https://www.malwarebytes.com/cybersecurity/basics/antivirus">Antivirus ></a></li><li><a href="https://www.malwarebytes.com/malware">Malware ></a></li><li><a id="cta-en-us-navbar-_resources_casestudies-click" href="https://www.malwarebytes.com/ransomware">Ransomware ></a></li><li><a href="https://www.malwarebytes.com/phishing">Phishing ></a></li><li><a href="https://www.malwarebytes.com/cybersecurity">See all articles ></a></li></ul></div></div> </div> </div> </div></li> <li id="menu-item-2911" class="support-menu-class menu-item menu-item-type-custom menu-item-object-custom menu-item-2911 menu-item-has-megamenu"><a href="#" id="cta-en-us-navbar-support-click">Support</a><div class="megamenu-wrap"> <div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-6 wp-block-columns-is-layout-flex"> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:30%"></div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:30%"></div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:35%"> <p>&lt; Support</p> <div class="wp-block-malware-bytes-menu-links menu-links layout-1 has-item-border" id="menu-links-8b91929a-d4ec-4127-b3f4-08b5703b82f6"><div class="menu-links__item"><div class="menu-links__title"><a id="cta-navbar-support-personal-click" href="https://support.malwarebytes.com/hc/en-us" data-type="page" data-id="3844">Malwarebytes Personal Support</a></div><p class="menu-links__desc">Malwarebytes and Teams Customers</p></div><div class="menu-links__item"><div class="menu-links__title"><a id="cta-navbar-support-Threatdown-business-click" href="https://support.threatdown.com/hc/en-us/?utm_campaign=mwb-referral&amp;utm_source=malwarebytes.com&amp;utm_medium=referral&amp;utm_content=cta-navbar-support-Threatdown-business-click" data-type="page" data-id="406">ThreatDown Business Support</a></div><p class="menu-links__desc">Nebula and Oneview Customers</p></div><div class="menu-links__item"><div class="menu-links__title"><a id="cta-navbar-support-community-forums-click" href="https://forums.malwarebytes.com/" data-type="page" data-id="124">Community Forums</a></div></div></div> </div> </div> </div></li> </ul> </nav><!-- #site-navigation --> <div class="site-header__actions"> <a href="#" id="cta-navbar-freedownload-main-en-test" class="mb-free-download-btn btn-main btn-primary-yellow u-text-transform-upper">Free Download</a> </div> <ul id="secondary-menu-mob" class="secondary-menu u-flex-direction-column u-display-none@min-1150"></ul> <!-- Search HTML Mobile --> <div class="site-header-searchbox"> <button class="searchbox-nav-mobile" aria-label="Search in MalwareBytes">Search</button> <button class="searchbox-nav" aria-label="Search in MalwareBytes">Search</button> <div class="search-modal"> <label>Search Malwarebytes.com</label> <div class="custom-search-form"> <form role="search" method="get" class="search-form" action="https://www.malwarebytes.com/"> <label> <span class="screen-reader-text">Search for:</span> <input type="search" class="search-field" placeholder="Type to search..." value="" name="s" /> </label> <input type="submit" class="search-submit" value="Search" /> </form> </div> </div> </div> <!-- Search --> </div> </div> </div> </div> </header><!-- #masthead --> <main id="primary" class="site-main"> <article id="post-515" class="malwarebytes-post-article post-515 page type-page status-publish hentry page_category-a-b-test"> <div class="entry-content"> <div class="wp-block-malware-bytes-glossary glossary" id="glossary-f2aa381c-5bed-4e47-8047-aed85e36e2c6"><div class="glossary__hero" style="background-color:#0D3ECC"><div class="glossary__hero-wrap"><h1>Glossary</h1><ul class="glossary__index"><li><a href="javascript:void(0);" data-tab="glossary-tab-A" rel="noopener noreferrer">A</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-B" rel="noopener noreferrer">B</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-C" rel="noopener noreferrer">C</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-D" rel="noopener noreferrer">D</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-E" rel="noopener noreferrer">E</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-F" rel="noopener noreferrer">F</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-G" rel="noopener noreferrer">G</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-H" rel="noopener noreferrer">H</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-I" rel="noopener noreferrer">I</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-J" rel="noopener noreferrer">J</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-K" rel="noopener noreferrer">K</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-L" rel="noopener noreferrer">L</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-M" rel="noopener noreferrer">M</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-N" rel="noopener noreferrer">N</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-O" rel="noopener noreferrer">O</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-P" rel="noopener noreferrer">P</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-Q" rel="noopener noreferrer">Q</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-R" rel="noopener noreferrer">R</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-S" rel="noopener noreferrer">S</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-T" rel="noopener noreferrer">T</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-U" rel="noopener noreferrer">U</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-V" rel="noopener noreferrer">V</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-W" rel="noopener noreferrer">W</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-X" rel="noopener noreferrer">X</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-Y" rel="noopener noreferrer">Y</a></li><li><a href="javascript:void(0);" data-tab="glossary-tab-Z" rel="noopener noreferrer">Z</a></li></ul></div></div><div class="glossary__content"> <div class="container"> <h2>A</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Abandonware</h3> <!-- wp:paragraph --> <p>Abandonware is software that is shelved by its developer. As such, it is no longer updated nor supported so it may be rife with vulnerabilities.</p> <!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Account harvesting</h3> <!-- wp:paragraph --> <p>Account harvesting is the process of gathering user accounts from a system, service, or database using a variety of methods, such as <a href="https://www.malwarebytes.com/glossary/malware" rel="noopener">malware</a> or <a href="https://www.malwarebytes.com/phishing">phishing</a>.</p> <!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Account hijacking</h3> <!-- wp:paragraph --><p>Account hijacking is the process of taking over user online accounts, such as email and social media accounts.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Ad blocker</h3> <!-- wp:paragraph --><p>An ad blocker is software that blocks advertisements, including pop-ups, when a user visits websites.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Ad fraud</h3> <!-- wp:paragraph --><p>Ad fraud happens when advertisers pay for ads with false impressions. For more information, see <a href="https://blog.malwarebytes.com/cybercrime/2017/03/adware-vs-ad-fraud/" target="_blank" rel="noopener">this blog post</a>&nbsp;on the difference between adware and ad fraud. Synonym: Invalid traffic</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Ad rotator</h3> <!-- wp:paragraph --><p>An ad rotator allows two or more ads to alternately show in the same place on a website. The rotator triggers whenever a user refreshes or revisits a site.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Add-in</h3> <!-- wp:paragraph --><p>An add-in is software that gives additional functionality to a device or another software.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Address bar</h3> <!-- wp:paragraph --><p>An address bar is the text box in your web browser that displays the web page URL or IP address. At times, it functions as a search bar if the user entered text that is an invalid URL.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Address bar spoofing</h3> <!-- wp:paragraph --><p>Address bar spoofing is a technique where the legitimate URL on a browser address bar is replaced with a rogue one. This then leads to potential data or financial theft.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Address Resolution Protocol (ARP)</h3> <!-- wp:paragraph --><p>An address resolution protocol (ARP) is the system or process of mapping or finding a physical address belonging to an IP address in the local network.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Advanced Encryption Standard (AES)</h3> <!-- wp:paragraph --><p>Developed by the <a href="https://www.malwarebytes.com/glossary/national-institute-of-standards-and-technology-nist" rel="noopener noreferrer">National Institute of Standards and Technology (NIST)</a>, Advanced Encryption Standard (AES) is a block cipher that provides fast, strong, and secure encryption of classified data. AES was created as an alternative to the Data Encryption Standard (DES), because it became vulnerable to <a href="https://www.malwarebytes.com/glossary/brute-force-attack" rel="noopener noreferrer">brute-force attacks</a>. Synonym(s): Rijndael Block Cipher</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Advanced persistent threat (APT)</h3> <!-- wp:paragraph --><p>An advanced persistent threat (APT) is a prolonged, targeted attack on a specific entity or entities with the intention of compromising their systems and gaining information from or about them. For more information, see <a href="https://blog.malwarebytes.com/cybercrime/malware/2016/07/explained-advanced-persistent-threat-apt/" rel="noopener" target="_blank">this blog post</a> on an in-depth look at APT and why cybersecurity professionals often groan at claims of APT attacks.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Advanced Research Projects Agency Network (ARPANET)</h3> <!-- wp:paragraph --><p>The Advanced Research Projects Agency Network (ARPANET) was an experimental computer network, which later on became the basis for the Internet.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Adware</h3> <!-- wp:paragraph --><p>Adware, or advertising-supported software, is software that displays unwanted advertising on your computer device. For more information, see <a href="https://blog.malwarebytes.com/cybercrime/2015/03/adware-delivery-methods/" target="_blank" rel="noopener">this blog post</a>&nbsp;on adware delivery methods. For an in-depth look at adware, see <a href="https://www.malwarebytes.com/adware" rel="noopener">this page</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Air gap</h3> <!-- wp:paragraph --><p>Air gap refers to computers that are incapable of physically connecting to a network or another computer that is connected to the internet. Air-gapped systems were believed to be more secure until Stuxnet disproved this. Other forms: Air gapping</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Always-On</h3> <!-- wp:paragraph --><p>An always-on device, software, or network denotes that it is constantly accessible.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>American Standard Code for Information Interchange (ASCII)</h3> <!-- wp:paragraph --><p>The American Standard Code for Information Interchange (ASCII) is an encoding standard for electronic communication. Codes in the ASCII table represent text in computing devices.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Analog</h3> <!-- wp:paragraph --><p>In computing, analog is a term used to describe old-fashion and slow computers and other devices. If used in the context of signals, an analog references to a mechanism or device where information is presented by variable physical quantities.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Android</h3> <!-- wp:paragraph --><p>Android is Google&#8217;s flagship <a href="https://www.malwarebytes.com/glossary/operating-system-os" rel="noopener noreferrer">operating system</a> for smartphones and tablets. Manufacturers have adapted Android in televisions, smart-watches, cars, and many other electronic devices. For an in-depth look at Android antivirus, see <a href="https://www.malwarebytes.com/android-antivirus" rel="noopener noreferrer">this page</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Android app</h3> <!-- wp:paragraph --><p>An Android app is a program designed for the <a href="https://www.malwarebytes.com/glossary/android" rel="noopener">Android OS</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Annoybot</h3> <!-- wp:paragraph --><p>Annoybot is software that repeats an annoying task. IRC bots, for example, are annoybots that send out unsolicited messages to participants in a channel.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Annoyware</h3> <!-- wp:paragraph --><p>Annoyware is software that continuously shows reminders or pop-up windows to remind users to perform a particular action, such as registering or buying software. Synonyms: Nagware, Begware</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Anomaly detection</h3> <!-- wp:paragraph --><p>Anomaly detection is identifying irregularities or deviations in patterns, data points, events, or observations that do not conform to the norm or the expectations of businesses or groups. Not all detected anomalies are malicious. Synonym: Outlier detection</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Anonymization</h3> <!-- wp:paragraph --><p>Anonymization is the action or an attempt to disable the ability to track back information or actions to a specific user. Other forms: Anonymize</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Anonymizer</h3> <!-- wp:paragraph --><p>An anonymizer is a tool that minimizes the amount of tracking done during surfing in an attempt to hide the true identity of the user. Synonyms: Anonymous proxy</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Anonymous</h3> <!-- wp:paragraph --><p>Anonymous, in computing, is to keep one&#8217;s true name and identity concealed online with the use of various applications. Other forms: Anonymity</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Anti-ransomware</h3> <!-- wp:paragraph --><p>Anti-ransomware is software specifically designed to combat ransomware. Such software could make use of specific techniques that general security tools don&#8217;t deploy.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Anti-virus (AV) killer</h3> <!-- wp:paragraph --><p>An AV killer is malicious code that disables the user&#8217;s anti-virus software to avoid detection. Sometimes, this term is used for <a href="https://www.malwarebytes.com/glossary/malware" rel="noopener noreferrer">malware</a> that disables firewalls. Synonym: <a href="https://www.malwarebytes.com/glossary/retrovirus" rel="noopener noreferrer">Retrovirus</a></p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Antivirus</h3> <!-- wp:paragraph --><p>Antivirus is an antiquated term used to describe security software that detects, protects against, and removes <a href="https://www.malwarebytes.com/glossary/malware" rel="noopener noreferrer">malware</a>. For an in-depth look at antivirus, see <a href="https://www.malwarebytes.com/antivirus" rel="noopener noreferrer">this page</a>. Synonyms: anti-malware.</p><!-- /wp:paragraph --> <!-- wp:paragraph --><p>Download our <a href="https://www.malwarebytes.com/mwb-download">free antivirus</a> to protect yourself from viruses and malware.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Applet</h3> <!-- wp:paragraph --><p>An applet is a piece of software that usually performs one specific task. Applets are often part of a more complex program.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Application programming interface (API)</h3> <!-- wp:paragraph --><p>An application programming interface (API), in simple terms, is a means for different software to talk to one another. It is the code that governs its server&#8217;s access points. APIs have many uses and take many forms.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Application security</h3> <!-- wp:paragraph --><p>Application security is the practice of applying security measures to the software application. This has to be done to defend against threats and attacks from the outside that attempt to exploit the app.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Artificial intelligence (AI)</h3> <!-- wp:paragraph --><p>AI is a system&#8217;s or an application&#8217;s ability to correctly interpret and learn from data to achieve specific goals and tasks. For more information, see <a href="https://blog.malwarebytes.com/security-world/2018/03/how-artificial-intelligence-and-machine-learning-will-impact-cybersecurity/" rel="noopener" target="_blank">this blog post</a> on how AI and <a href="https://www.malwarebytes.com/glossary/machine-learning-ml" rel="noopener">machine learning</a> can impact cybersecurity. Synonym: Machine intelligence</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Astroturfing</h3> <!-- wp:paragraph --><p>Astroturfing is the masking of initiatives by corporations, governments, or political parties to make a campaign appear spontaneous or initiated by civilian groups. Sometimes, masking the origin makes a campaign more effective or less controversial.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Asymmetric cryptography</h3> <!-- wp:paragraph --><p>Asymmetric cryptography is a system of secure communication that uses a pair of keys: a public key and a private key. A public key can be shared with anyone and publicly known, but only a private key must be kept secret and known only by the owner. Synonym: Public-key cryptography</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Attack vector</h3> <!-- wp:paragraph --><p>An attack vector feres to the technique used to obtain unauthorized access to a system or network. It is an integral part of vulnerability research to know which attack vector is or might be used.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Attribution</h3> <!-- wp:paragraph --><p>Attribution is the practice of taking forensic artifacts of a cyberattack and matching them to known threats against targets with a profile matching a particular organization. For an in-depth look, see our two-part blog series on <a href="https://blog.malwarebytes.com/101/2016/10/attribution-and-when-you-should-care-part-1/" target="_blank" rel="noopener">when you should care</a> about attribution and <a href="https://blog.malwarebytes.com/101/2016/11/attribution-part-ii-dont-overthink-it/" target="_blank" rel="noopener">why one shouldn&#8217;t overthink it</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Augmented reality (AR)</h3> <!-- wp:paragraph --><p>AR is a cross between the physical world and <a href="https://www.malwarebytes.com/glossary/virtual-reality">virtual reality</a>. It adds images, sounds, motion, and even smell to the physical reality.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Authentication</h3> <!-- wp:paragraph --><p>In computing, authentication is the process of verifying the identity of a user or process. For more information, see <a href="https://blog.malwarebytes.com/101/2017/01/understanding-the-basics-of-two-factor-authentication/" target="_blank" rel="noopener">this blog post</a> on the basics of two-factor authentication (2FA). Other forms: Auth</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-A"> <h3>Autonomous system</h3> <!-- wp:paragraph --><p>An autonomous system is a group of networks managed by one large entity to ensure there&#8217;s a reliable routing policy to the internet.</p><!-- /wp:paragraph --> </div> <h2>B</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Backdoor</h3> <!-- wp:paragraph --><p>A backdoor is a type of <a href="https://www.malwarebytes.com/glossary/trojan" rel="noopener noreferrer">Trojan</a> that allows a <a href="https://www.malwarebytes.com/glossary/threat-actor" rel="noopener noreferrer">threat actor</a> access to a system by bypassing its security. This term can also refer to the method of gaining access to user systems undetected. For an in-depth look at backdoors, see <a href="https://www.malwarebytes.com/backdoor" rel="noopener noreferrer">this page</a>. Other forms: backdooring</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Bad sector</h3> <!-- wp:paragraph --><p>A bad sector is a sector on a computer&#8217;s disk or flash drive that is already unusable. This is usually caused by physical damage.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Bait advertising</h3> <!-- wp:paragraph --><p>Bait advertising is an unethical advertising practice wherein customers are promised a sale or inexpensive item. However, once customers are interested, the advertiser makes the product unavailable then redirects them to a similar product that is more expensive. Synonym: Bait and switch advertising</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Banking Trojan</h3> <!-- wp:paragraph --><p>A banking Trojan is a type of <a href="https://www.malwarebytes.com/glossary/trojan" rel="noopener noreferrer">Trojan</a> specifically created to harvest credentials and other sensitive financial and personal information stored and processed through online banking systems.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Behavior</h3> <!-- wp:paragraph --><p>In the context of computer malware, behavior refers to the actions <a href="https://www.malwarebytes.com/glossary/malware" rel="noopener">malware</a> performs on an affected system once executed.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Behavioral biometrics</h3> <!-- wp:paragraph --><p>Behavioral biometrics is a biometric modality that dynamically analyzes and quantifies unique identifiers and measurable human patterns. For more information, see <a href="https://blog.malwarebytes.com/101/2018/04/securing-financial-data-of-the-future-behavioral-biometrics-explained/" target="_blank" rel="noopener">this post</a> on the use of behavioral biometrics in the financial sector.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Big data</h3> <!-- wp:paragraph --><p>Big data pertains to huge datasets that can be analyzed computationally to reveal trends, patterns, and associations. Companies use big data to improve their operations and make more intelligent decisions.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Big-game hunting (BGH)</h3> <!-- wp:paragraph --><p>Originally used within hunting circles, the term &#8220;big-game hunting (BGH)&#8221; in cybersecurity refers to the criminal tactic of going after high-earning organizations across industries in often sophisticated cyber attack campaigns. BGH could also be used to describe the process of focusing on high-value data or assets within a business.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Binary</h3> <!-- wp:paragraph --><p>A binary is a numerical system with only two different values: 0 and 1, or True and False. Binary is popular in both electronics and in computing.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Biohacking</h3> <!-- wp:paragraph --><p>In computing, biohacking is a form of hacking that refers to the application of IT concepts to biological systems, usually the human body. Biohacking can include the modification of the human body, such as introducing implants and other wearable computing tech.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Biometrics</h3> <!-- wp:paragraph --><p>Biometrics is the measurement and statistical analysis of people&#8217;s physical and behavioral characteristics. In biometrics authentication, personally identifiable and unique features are stored in order to give the holder access to certain resources.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>BIOS</h3> <!-- wp:paragraph --><p>BIOS stands for &#8220;basic input/output system&#8221;. It is <a href="https://www.malwarebytes.com/glossary/firmware" rel="noopener noreferrer">firmware</a> used by the computer&#8217;s microprocessor to initialise the computer when the user physically turns it on.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Bitcoin</h3> <!-- wp:paragraph --><p>Bitcoin is a type of digital currency, or <a href="https://www.malwarebytes.com/glossary/cryptocurrency" rel="noopener noreferrer">cryptocurrency</a>, which is a payment medium that is not tied to a central bank or regulated by a governing body. Instead, it relies on secure storage of transactions on a technological platform known as blockchain. Bitcoin is a popular payment method among Internet criminals, as it uses a fast, reliable, and verifiable system.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Black Friday</h3> <!-- wp:paragraph --><p>Black Friday is regarded as the unofficial start of the Christmas shopping season. Starting from midnight on the Friday after US Thanksgiving, retailers open their doors and offer numerous specials and deep discounts. Because of this, consumers often go online or to brick-and-mortar retail shops en masse.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Blacklist</h3> <!-- wp:paragraph --><p>In computing, a blacklist usually refers to a list of domains and/or <a href="https://www.malwarebytes.com/glossary/ip-address" rel="noopener">IP addresses</a>&nbsp;that are known or suspected malicious servers and/or domains. These lists are used to protect users from receiving mail from the blacklisted servers or from browsing to dangerous sites hosted on these domains/IP addresses.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Blended threat</h3> <!-- wp:paragraph --> <p>A blended threat is an attack that makes use of multiple vectors to gain leverage on a target. This could include <a href="https://www.malwarebytes.com/glossary/malware" rel="noopener">malware</a>, <a href="https://www.malwarebytes.com/phishing">phishing</a>, <a href="https://www.malwarebytes.com/glossary/social-engineering" rel="noopener">social engineering</a> and more.</p> <!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Bloatware</h3> <!-- wp:paragraph --><p>Bloatware is the slang used to describe software that has unnecessary features, requiring more disk space to install and run. Sometimes, bloatware refers to the applications or programs pre-installed on new systems.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Block cipher</h3> <!-- wp:paragraph --><p>A block cipher is one of two methods of encryption. With this method, the plaintext is broken down into fixed-sized blocks before combining them with a key. Also see stream cipher.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Blue Screen of Death (BSoD)</h3> <!-- wp:paragraph --><p>A Blue Screen of Death (BSoD) occurs on Windows systems when a full blue screen appears to the user after encountering a fatal error.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Bluejacking</h3> <!-- wp:paragraph --><p>Bluejacking is the act of sending messages between mobile devices via <a href="https://www.malwarebytes.com/glossary/bluetooth" rel="noopener">Bluetooth</a> wireless connection.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Bluesnarfing</h3> <!-- wp:paragraph --><p>Bluesnarfing refers to the unauthorized access and theft of information through a <a href="https://www.malwarebytes.com/glossary/bluetooth" rel="noopener noreferrer">Bluetooth</a> connection. Mobile devices, such as smartphones, laptops, and tablets that are Bluetooth-enabled can be affected by this.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Bluetooth</h3> <!-- wp:paragraph --><p>Bluetooth is a wireless technology mainly used for short distance connections between devices due to its low power signal. Communication is done at a bandwidth around 2.45 GHz. It doesn&#8217;t need a line of sight to establish a connection.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Boot</h3> <!-- wp:paragraph --><p>In computing, to boot a system is to turn the device or machine on and load the <a href="https://www.malwarebytes.com/glossary/operating-system-os" rel="noopener noreferrer">OS</a> into RAM. The boot-up process is made up of different stages, depending on the setup of the system and the OS that has to be loaded.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Boot sector</h3> <!-- wp:paragraph --><p>A boot sector is part of a physical information carrier (usually a hard drive) that contains the code that has to be loaded into a system&#8217;s RAM to start the actual boot process and load the <a href="https://www.malwarebytes.com/glossary/operating-system-os" rel="noopener noreferrer">OS</a>. The boot sector is created when a volume is formatted.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Boot sector virus</h3> <!-- wp:paragraph --><p>A boot sector virus is <a href="https://www.malwarebytes.com/glossary/malware" rel="noopener noreferrer">malware</a> that infects the boot sector of a drive or other storage device. During a <a href="https://www.malwarebytes.com/glossary/boot" rel="noopener noreferrer">boot</a>, this sector is automatically located and loaded into memory, making them harder to remove, as they will load before normal removal software.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Bootkit</h3> <!-- wp:paragraph --><p>A bootkit is a type of <a href="https://www.malwarebytes.com/glossary/rootkit" rel="noopener">rootkit</a>&nbsp;that alters or replaces the bootloader of the affected system in order to take control. To remove a bootkit, you need a bootable medium, which has the necessary tools to undo the changes made by the bootkit.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Bot</h3> <!-- wp:paragraph --><p>The word &#8220;bot&#8221; is a derivative of &#8220;robot.&#8221; It usually pertains to (1) one or more compromised machines controlled by a botmaster or <a href="https://www.malwarebytes.com/glossary/bot-herder" rel="noopener noreferrer">herder</a> to spam or launch <a href="https://www.malwarebytes.com/glossary/ddos" rel="noopener noreferrer">DDoS attacks</a>, or (2) an automated program coded with particular instructions to follow, which includes interacting with websites and humans via web interfaces (e.g., IMs). A collective of bots is called a <a href="https://www.malwarebytes.com/glossary/botnet" rel="noopener noreferrer">botnet</a>. Synonym: zombie machine</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Bot herder</h3> <!-- wp:paragraph --><p>A bot herder is the <a href="https://www.malwarebytes.com/glossary/threat-actor" rel="noopener noreferrer">threat actor</a> who controls and maintains a <a href="https://www.malwarebytes.com/glossary/bot" rel="noopener noreferrer">bot</a> or <a href="https://www.malwarebytes.com/glossary/botnet" rel="noopener noreferrer">botnet</a>. Synonym: botnet herder</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Botnet</h3> <!-- wp:paragraph --><p>A botnet is a collection of <a href="https://www.malwarebytes.com/glossary/bot" rel="noopener">bots</a>. The term also refers to the <a href="https://www.malwarebytes.com/glossary/malware" rel="noopener">malware</a> run on a connected device to turn it into a bot. Synonym: zombie network</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Breadcrumbs</h3> <!-- wp:paragraph --><p>In computing, breadcrumbs are navigation aids that tell users exactly where they are while surfing on a site or in a set of folders. Breadcrumbs show the hierarchy of links on a site or the steps in the folder structure. Consider, for example, the address bar in a Windows explorer window, which contains breadcrumbs from a file to the folders in which it is contained.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Bricking</h3> <!-- wp:paragraph --><p>Bricking refers to the practice or act of rendering an electronic computing device &mdash; often a smartphone &mdash; useless or inoperable. Bricking usually happens by accident, such as when a firmware update gets interrupted.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Bring your own device (BYOD)</h3> <!-- wp:paragraph --><p>Bring your own device, abbreviated as BYOD, is a trend wherein employees bring their personal computing devices, usually a smartphone or laptop, to be used in the workplace. These devices are then connected to the company&#8217;s internal network, which may introduce additional risks to the company. Synonym: bring your own technology (BYOT)</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Browlock</h3> <!-- wp:paragraph --><p>Browlock is a portmanteau of &#8220;browser&#8221; and &#8220;lock&#8221;. This term is used either (1) to describe the state of an internet browser when the user is unable to perform certain actions or (2) to pertain to a malware&#8217;s malicious control over browser windows. A browlock can close the open tab or window, block access to the desktop of the system, and stop you from navigating to another site. For more information, see <a href="https://blog.malwarebytes.com/cybercrime/2015/09/regaining-control-over-edge/" target="_blank" rel="noopener noreferrer">this blog post</a> on browser lockers.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Browser helper object (BHO)</h3> <!-- wp:paragraph --><p>A browser helper object (BHO) is a DLL component of Internet Explorer (IE) that provides added functionality to the browser.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Brute force attack</h3> <!-- wp:paragraph --><p>A brute force attack is a method wherein an application attempts to decode encrypted data, such as a password, by trial and error. A <a href="https://www.malwarebytes.com/glossary/dictionary-attack" rel="noopener noreferrer">dictionary attack</a>, for example, is a type that falls under this attack. See also <a href="https://www.malwarebytes.com/glossary/password-cracking-application" rel="noopener noreferrer">password cracking application</a></p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Buffer</h3> <!-- wp:paragraph --><p>In computing, a buffer refers to the amount of data stored and shared between applications to compensate for the difference in speed with which these can handle the data. Consider, for example, your browser buffering (part of) a movie while downloading it and, at the same time, while your movie player plays it.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Buffer overflow</h3> <!-- wp:paragraph --><p>A buffer overflow is a computer anomaly wherein a program writes to a block of memory (or buffer) more than what it is allocated to hold. Synonym: Buffer overrun</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Bug bounty</h3> <!-- wp:paragraph --><p>A bug bounty is a rewards program through which individuals can receive monetary compensation and/or recognition for finding flaws or vulnerabilities in a company&#8217;s software or system.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Bundler</h3> <!-- wp:paragraph --><p>A bundler is an assemblage of two or more software offered in one combined package. It usually contains (1) the main program a user is after and (2) <a href="https://www.malwarebytes.com/glossary/bundleware" rel="noopener noreferrer">bundleware</a>. Many bundlers are found in freeware download sites. In some cases, these &#8220;free&#8221; software are actually trial versions of programs one commonly pays for.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Bundleware</h3> <!-- wp:paragraph --><p>Bundleware is a term used to collectively describe one or more software that comes in <a href="https://www.malwarebytes.com/glossary/bundler">bundles</a> as extra. This isn&#8217;t necessarily malicious. Bundleware that are dodgy at best have a few types:</p><!-- /wp:paragraph --> <!-- wp:list --><ul> <!-- wp:list-item --><li>Programs that are considered adware and PUPs. These may or may not offer users the option to opt out of the extra programs.</li><!-- /wp:list-item --> <!-- wp:list-item --><li>Programs that are useful but nobody wants to pay for their functionality, so the developer enters some monetization program that incorporates adware into his/her program.</li><!-- /wp:list-item --> <!-- wp:list-item --><li>PUPs that offer to install other PUPs from the same manufacturer during the installation.</li><!-- /wp:list-item --> <!-- wp:list-item --><li>Programs that also install software packages they need to run on the affected system.</li><!-- /wp:list-item --> </ul><!-- /wp:list --> <!-- wp:paragraph --><p>Malwarebytes detects these types.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Burn</h3> <!-- wp:paragraph --><p>In computing, to burn is to write data to a drive with a recordable disc (i.e. burn a CD or DVD). The data is written onto the disc using a laser and, until the invention of rewritable discs (RW), this was considered a one-time-only process.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Business continuity management (BCM)</h3> <!-- wp:paragraph --><p>Business continuity management is a term used to describe the holistic process of identifying an organization&#8217;s risk of exposure to potential threats found internally and/or externally and the impacts these may cause. Its goal is to prepare the organization to effectively respond to threats, protect the business&#8217;s interests, and ensure the continuity of the company in the event of such threats.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Business email compromise (BEC)</h3> <!-- wp:paragraph --> <p>A business email compromise (BEC) is an attack wherein an employee, who is usually the CFO or someone from the Finance department, is <a href="https://www.malwarebytes.com/social-engineering" rel="sponsored nofollow">s</a><a href="https://www.malwarebytes.com/social-engineering">ocially engineered</a> into wiring a large sum of money to a third-party account.</p> <!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-B"> <h3>Business process compromise (BPC)</h3> <!-- wp:paragraph --><p>A business process compromise (BPC) is an attack wherein the <a href="https://www.malwarebytes.com/glossary/threat-actor" rel="noopener noreferrer">threat actor</a> targets weaknesses in an organization&#8217;s processes, systems, and loopholes in its operations to manipulate or alter them to their advantage. Unlike in <a href="https://www.malwarebytes.com/glossary/business-email-compromise-bec" rel="noopener noreferrer">business email compromise (BEC)</a>, BPC doesn&#8217;t rely on <a href="https://www.malwarebytes.com/glossary/social-engineering" rel="noopener noreferrer">social engineering</a> tactics.</p><!-- /wp:paragraph --> </div> <h2>C</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Cache</h3> <!-- wp:paragraph --><p>In computing, a cache is a temporary storage that is used to speed up future requests. For example, a browser cache stores contents of websites so they can be displayed faster the next time the user visits them. For information about DNS cache poisoning, have a look at the blog post, <a href="https://blog.malwarebytes.com/cybercrime/2015/09/dns-hijacks-what-to-look-for/" target="_blank" rel="noopener">DNS hijacks: what to look for</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Children&#8217;s Online Privacy Protection Act (COPPA)</h3> <!-- wp:paragraph --><p>The Children&#8217;s Online Privacy Protection Act, or COPPA, is a privacy law that protects children under the age of 13. It was first passed in 1998. The Federal Trace Commission (FTC) manages COPPA. To read more, go <a href="https://www.ftc.gov/enforcement/rules/rulemaking-regulatory-reform-proceedings/childrens-online-privacy-protection-rule" target="_blank" rel="noopener noreferrer">here</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Cipher</h3> <!-- wp:paragraph --><p>In cryptography, a cipher is the method of hiding text with encryption. The machine can hide text by replacing original letters with other letters and by substituting or transposing numbers and symbols. A cipher also refers to the encryption key that reveals the plaintext.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Ciphertext</h3> <!-- wp:paragraph --><p>A ciphertext is the encrypted form of a plaintext.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Click fraud</h3> <!-- wp:paragraph --><p>Click fraud is the practice of artificially inflating statistics of online advertisements by using automated clicking programs or hitbots. Synonym: Pay-per-click fraud See also <a href="https://www.malwarebytes.com/glossary/adfraud" rel="noopener">ad fraud</a></p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Clickbait</h3> <!-- wp:paragraph --><p>Clickbait is content (especially a headline) that uses exaggeration and sensationalism to entice you into clicking on a link to a particular web page. Clickbait often leads to content of questionable value.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Clickjacking</h3> <!-- wp:paragraph --><p>Clickjacking is a type of attack that tricks a user into clicking a website element that is either invisible or disguised as another element. This hijacks a user&#8217;s click meant for one thing but leads to another. For example: instead of clicking a button to reply, a clickjacking attack on a Twitter user can make them re-tweet a malicious domain to followers instead. This is typically seen as browser security issue. However, such an attack can also take place in mobile applications. Clickjacking has different types, such as likejacking. Synonyms: User interface (UI) redress attack, UI redressing</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Cloud computing</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/what-is-the-cloud">Cloud computing</a> refers to the delivery of services that are hosted over the internet to computers and other computing devices. For more information, see <a href="https://blog.malwarebytes.com/101/2017/11/explained-the-cloud/" target="_blank" rel="noopener noreferrer">this blog post</a> on the cloud. See also <a href="https://www.malwarebytes.com/glossary/xaas" rel="noopener noreferrer">Anything-as-a-Service (XaaS)</a></p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Cloud phishing</h3> <!-- wp:paragraph --> <p>Cloud phishing refers to a <a href="https://www.malwarebytes.com/phishing">phishing</a> trend that uses the guise of cloud computing services to get users to click malicious links. Campaigns of this kind usually start off in emails and social media posts. See also: <a href="https://www.malwarebytes.com/cybersecurity/basics/spear-phishing">spear phishing</a>.</p> <!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Cloud security</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/cybersecurity/business/what-is-cloud-security">Cloud security</a>&nbsp;involves practices, policies, and controls to protect cloud-based data, applications, and infrastructure from cyber intrusions.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Cobalt Strike</h3> <!-- wp:paragraph --><p>Cobalt Strike is a legitimate tool used in penetration testing and threat emulation. While it is popular among pen testers, underground criminals are notorious for abusing the tool. They do this by making the tool a part of their attack campaigns.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Cold boot</h3> <!-- wp:paragraph --><p>In computing, a cold boot happens when a system is powered up from its off state. Cold booting is sometimes used to remedy certain system hiccups. Other forms: Cold booting</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Command &amp; control (C&amp;C)</h3> <!-- wp:paragraph --><p>Command &amp; control, also called C&amp;C or C2, is a centralized server or computer that online criminals use to issue commands to control malware and bots as well as to receive reports from them. &nbsp; <strong>Learn more:</strong> <a href="https://www.malwarebytes.com/hacker">Hacking</a> <a href="https://www.malwarebytes.com/malware">Malware</a> <a href="https://www.malwarebytes.com/bot">Bots</a> <a href="https://www.malwarebytes.com/botnet">Botnet</a> &nbsp;</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Companion virus</h3> <!-- wp:paragraph --><p>A companion virus is an old type of <a href="https://www.malwarebytes.com/glossary/virus">virus</a> that poses as a legitimate file by copying its file name but uses a different extension. It doesn&#8217;t modify files.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Compromised</h3> <!-- wp:paragraph --><p>Compromised sites (or servers) are otherwise legitimate sites that are being used by hackers without the owner&#8217;s knowledge. Compromised sites are often used to house and spread malware.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Computer ethics</h3> <!-- wp:paragraph --><p>Computer ethics is a philosophy concerned with how professionals in the field of computing should make decisions. Examples would be rules for disclosing of compromised information and vulnerabilities, copying of electronic content, and the impact of computers &mdash; <a href="https://www.malwarebytes.com/glossary/artificial-intelligence-ai" rel="noopener">AI</a>, for example&mdash;on human lives.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Computer science (CS)</h3> <!-- wp:paragraph --><p>Computer science, abbreviated as CS, is a multi-disciplinary collection of studies in the fields that are related to digital information. Computer systems, the internet, programming, and data storage are some of the best-known fields.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Computer-Aided Design (CAD)</h3> <!-- wp:paragraph --><p>Computer-Aided Design, or CAD, is the use of computer technology to help with the design of two- or three-dimensional objects. This specialized type of software helps to design, modify, analyze, optimize, and even create objects in many fields, including architecture, mechanics, engineering, and art.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Consumer fraud protection</h3> <!-- wp:paragraph --><p>Consumer fraud protection is a law designed to shield consumers against goods and services that didn&#8217;t perform as advertised. Consumers are also protected against unfair trade (overcharging) and fraudulent credit practices.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Cookie</h3> <!-- wp:paragraph --><p>In the context of computing, a cookie is a text file that a website puts into a visitor&#8217;s computer to recognize them and keep track of their preference. A cookie can be stored temporarily (session cookie) or permanently on the hard disk (persistent cookie). For more information, see <a href="https://blog.malwarebytes.com/101/2018/01/cookies-should-i-worry-about-them/" target="_blank" rel="noopener noreferrer">this blog post</a> on whether we should worry about cookies or not.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Crack</h3> <!-- wp:paragraph --><p>A crack is either used as a:</p><!-- /wp:paragraph --> <!-- wp:list {"ordered":true} --><ol> <li><em>noun:</em> A piece of software used to figure out passwords using a dictionary attack. It can also be a piece of software or tool used to illegally bypass certain software security features, such as copy protection.</li> <li><em>verb:</em> The act of breaking into a secured computer system. The person doing the crack is called a <em>cracker</em>. Some argue that there are distinctions between a cracker and a <a href="https://www.malwarebytes.com/glossary/hacker" rel="noopener">hacker</a>.</li> </ol><!-- /wp:list --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Credential stuffing</h3> <!-- wp:paragraph --><p>Credential stuffing is a popular tactic of attempting to access online accounts using username-password combinations acquired from breached data. This is usually done using an automated tool.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Crimeware</h3> <!-- wp:paragraph --><p>Crimeware is sophisticated software designed specifically for certain criminal acts, such as data theft, ransom, network poisoning, and communications monitoring.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Cross-site scripting (XSS)</h3> <!-- wp:paragraph --><p>Cross-site scripting is a type of <a href="https://www.malwarebytes.com/glossary/injection-attacks" rel="noopener noreferrer">injection attack</a> wherein a vulnerability in web applications is exploited that allows a <a href="https://www.malwarebytes.com/glossary/threat-actor" rel="noopener noreferrer">threat actor</a> to inject malicious script into the site&#8217;s content. Affected trusted sites are made to deliver the malicious script to visitors.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Crypter</h3> <!-- wp:paragraph --><p>In malware research, this refers to a program that makes malware hard to read by researchers. The crudest technique for crypters is usually called obfuscation. A more elaborate blog post on that is <a href="https://blog.malwarebytes.com/threat-analysis/2013/03/obfuscation-malwares-best-friend/" target="_blank" rel="noopener">Obfuscation: Malware&#8217;s best friend</a>. Obfuscation is also used often in scripts, like JavaScript and <a href="https://blog.malwarebytes.com/cybercrime/2016/02/de-obfuscating-malicious-vbscripts/" target="_blank" rel="noopener">VBScript</a>. But most of the time, these are not difficult to bypass or de-obfuscate. More complex methods use actual encryption. More information about this and related subjects can be found in our blog post, <a href="https://blog.malwarebytes.com/cybercrime/malware/2017/03/explained-packer-crypter-and-protector/" target="_blank" rel="noopener">Explained: Packer, Crypter, and Protector</a></p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Cryptocurrency</h3> <!-- wp:paragraph --><p>Cryptocurrency is a decentralized digital currency. It is the preferred payment method of ransomware authors, and it can be generated by mining scripts embedded on websites.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Cryptocurrency mining</h3> <!-- wp:paragraph --><p>Cryptocurrency mining, popularly known as cryptomining, is the process of adding new transactions to a public ledger of previous transactions (called the blockchain) and introducing new cryptocurrencies into the system. For more information, see <a href="https://blog.malwarebytes.com/threat-analysis/2017/09/drive-by-mining-and-ads-the-wild-wild-west/">this blog post</a> on the dangers of drive-by mining and online ads.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Cryptography</h3> <!-- wp:paragraph --><p>Cryptography is the knowledge of sending and storing <a href="https://www.malwarebytes.com/glossary/encryption" rel="noopener">encrypted </a>data. For more information, see <a href="https://blog.malwarebytes.com/cybercrime/2013/07/how-to-encrypt-files-and-folders/" target="_blank" rel="noopener">this blog post</a> on how to encrypt files and folder.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Cryptojacking</h3> <!-- wp:paragraph --><p>Cryptojacking is the surreptitious use of computing devices to mine <a href="https://www.malwarebytes.com/glossary/cryptocurrency" rel="noopener noreferrer">cryptocurrency</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Customer Relationship Management (CRM)</h3> <!-- wp:paragraph --><p>A CRM is software that companies use to manage their relationships or interaction with current and potential customers.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>CVE identifier</h3> <!-- wp:paragraph --><p>A Common Vulnerabilities and Exposure (CVE) identifier is a unique number assigned to publicly known software vulnerabilities. It follows the format: CVE + year + at least 4 sequence number digits Vendors and researchers alike consider CVE identifiers as standard for identifying vulnerabilities. For example, CVE-2014-0160 is the CVE ID for the vulnerability commonly known as <a href="https://www.malwarebytes.com/glossary/heartbleed" rel="noopener noreferrer">Heartbleed</a>. Synonyms: CVE names, CVE IDs, CVE numbers, CVEs, vulnerability identifier</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Cyber espionage</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/cybersecurity/business/what-is-cyber-espionage">Cyber espionage</a>&nbsp;involves a threat actor or unauthorized cybercriminal who steals, damages, or exposes classified data with the intent to harm an individual or organization causing reputational destruction.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Cyber liability insurance</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/cybersecurity/business/what-is-cyber-liability-insurance">Cyber liability insurance</a>&nbsp;is a type of insurance policy that guards companies against costs associated with data breaches, including lost or damaged intellectual property.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Cyber Monday</h3> <!-- wp:paragraph --><p>Cyber Monday is the marketing term given to the Monday after the Thanksgiving holidays in the United States. For more information, see <a href="https://blog.malwarebytes.com/101/2017/11/10-tips-safe-online-shopping-cyber-monday/" target="_blank" rel="noopener">this blog post</a> on safe online shopping on Cyber Monday.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Cyberbullying</h3> <!-- wp:paragraph --><p>Cyberbullying is the act of threatening and intimidating others via electronic and digital means.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-C"> <h3>Cybercrime</h3> <!-- wp:paragraph --><p>Cybercrime is the term referring to crimes that are related to computers and networks, including traditional crimes like fraud, blackmail, and identity theft that are done over the Internet or by using computing devices.</p><!-- /wp:paragraph --> </div> <h2>D</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Data breach</h3> <!-- wp:paragraph --><p>A data breach happens when data deemed sensitive, protected, or confidential were illegally accessed or disclosed. Individuals may have viewed, copied, transmitted, stolen, or used such data accidentally or deliberately. For an in-depth look at data breaches, see <a href="https://www.malwarebytes.com/data-breach" rel="noopener noreferrer">this page</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Data exfiltration</h3> <!-- wp:paragraph --><p>Data exfiltration is an act of retrieving, copying, and transferring data, such as user credentials, about individuals or organizations without authorization. Synonym: Siphoning</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Data loss prevention (DLP)</h3> <!-- wp:paragraph --><p>DLP stands for <a href="https://www.malwarebytes.com/cybersecurity/business/what-is-dlp">Data Loss Prevention</a> which aims to improve an organization&#8217;s data security through data loss prevention (DLP) policies, methods, and systems that reduce the risk of data theft.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Data mining</h3> <!-- wp:paragraph --><p>Data mining is the process of sifting through large data sets to identify patterns or generate new information.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Data Privacy Day (DPD)</h3> <!-- wp:paragraph --><p>Data Privacy Day (DPD) is an annual, international event that occurs every January 28. Its purpose is to raise awareness about privacy and encourage internet users to follow data protection practices. DPD is observed by the USA, Canada, Israel, and Europe. In Europe, DPD is also known as Data Protection Day. For more information, see our blog post on why Data Privacy Day matters.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Data Protection</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/cybersecurity/business/what-is-data-protection">Data protection</a>&nbsp;involves a set of strategies, practices, and measures used to prevent corruption, compromise, and loss of data. This can also include cloud data potection.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Decryptor</h3> <!-- wp:paragraph --><p>A decryptor is a tool used to transform unreadable data back to its original, unencrypted form. This is typically used by those affected by <a href="https://www.malwarebytes.com/glossary/ransomware">ransomware</a> to restore their files.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Deepfake</h3> <!-- wp:paragraph --><p>A &#8220;deepfake&#8221; refers to recreated media of a person&#8217;s appearance (on a video or image) or voice by an artificial intelligence (AI).</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Definition</h3> <!-- wp:paragraph --><p>In computer security, a definition is code written into a database that enables cybersecurity software programs to identify and detect specific, known families of malware. Definitions are used in <a href="https://www.malwarebytes.com/glossary/signature" rel="noopener noreferrer">signature-based detection</a> methodology and therefore cannot be used to detect new or unknown forms of malware.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Defragmentation</h3> <!-- wp:paragraph --><p>Defragmentation is the process of reorganizing a file system so that files that were split up when saved and changed are put back together again. This removes pointers to and from the fragments and optimizes the speed with which these files can be used. Other forms: Defrag, defragment</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Destruction of service (DeOS)</h3> <!-- wp:paragraph --><p>Destruction of service is an attack using IoT <a href="https://www.malwarebytes.com/glossary/botnet" rel="noopener">botnets </a>that aim to destroy an organization&#8217;s backups and safety nets, which are used to recover critical systems and data after a cyber attack.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Device control</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/cybersecurity/business/what-is-device-control">Device control</a> is a cybersecurity measure used to protect endpoints by controlling, restricting,&nbsp;and&nbsp;blocking access of removable devices.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Dialer</h3> <!-- wp:paragraph --><p>A dialer can mean (1) a program or app that initiates the best connection for the number chosen by the user, (2) a program that connects a system to the internet over a telephone or ISDN line, or (3) <a href="https://www.malwarebytes.com/glossary/malware" rel="noopener">malware</a> that connects a system to a network or phone number with the intent to fraud. Other forms: Dialler</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Dictionary attack</h3> <!-- wp:paragraph --><p>A dictionary attack is an act of penetrating password-protected computer systems or servers using large sets of words in a dictionary. This attack usually works as many users still use ordinary words for their passwords. See also <a href="https://www.malwarebytes.com/glossary/brute-force-attack" rel="noopener noreferrer">brute force attack</a></p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Digital footprint</h3> <!-- wp:paragraph --><p>A digital footprint is the term used to describe the recorded&mdash;thus, traceable&mdash;internet or device activities of a particular person. Synonym: digital shadow</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Distributed Denial of Service (DDoS)</h3> <!-- wp:paragraph --><p>A distributed denial of service (DDoS) attack is a network attack wherein threat actors force numerous systems (usually infected with malware) to send requests to a specific web server to crash, distract, or disrupt it enough that users are unable to connect to it. For an in-depth look at DDoS attacks, see <a href="https://www.malwarebytes.com/ddos" rel="noopener noreferrer">this page</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>DNS filtering</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/cybersecurity/business/what-is-dns-filtering">DNS filtering</a>,&nbsp;also known as DNS blocking, is a cybersecurity method in which end users are denied access to nefarious content with a goal in stopping web-based threats at the <a href="https://www.malwarebytes.com/glossary/domain-name-system">DNS (Domain Name System)</a> level.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>DNS over HTTPS (DoH)</h3> <!-- wp:paragraph --><p>DNS over HTTP (DoH) is an alternative to DNS over TLS (DoT). It is a work-in-progress, network security protocol wherein DNS requests and responses are encrypted and sent via HTTP or&nbsp; HTTPS protocols instead of directly over UDP. This is to increase user privacy and security.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>DNS over TLS (DoT)</h3> <!-- wp:paragraph --><p>DNS over TLS (DoT) is a network security protocol wherein DNS requests and responses are encrypted and not tampered with using the TLS security protocol. This is done to increase user security and privacy. DNS over HTTPS (DoH) is an alternative to DoT.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Domain</h3> <!-- wp:paragraph --><p>In computer security, a domain can refer to:</p><!-- /wp:paragraph --> <!-- wp:list {"ordered":true} --><ol> <li>A group of computers that are under the control of a common operator and administered as one unit, or</li> <li>The name of a Web resource following the rules of the <a href="https://www.malwarebytes.com/glossary/domain-name-system">Domain Name System (DNS)</a>, which translates the domain name into an <a href="https://www.malwarebytes.com/glossary/ip-address" rel="noopener">IP address</a></li> </ol><!-- /wp:list --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Domain administrator privileges</h3> <!-- wp:paragraph --><p>Domain administrator privileges refer to administrator access to all machines within a network.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Domain Name System (DNS)</h3> <!-- wp:paragraph --><p>A <a href="https://www.malwarebytes.com/cybersecurity/business/what-is-dns-filtering">Domain Name System</a>, abbreviated as DNS, is an Internet protocol that translates user-friendly, readable URLs, such as malwarebytes.com, to their numeric IP addresses, allowing the computer to identify a web server without the user having to remember and input the actual IP address of the server. Name Servers, or Domain Name Servers, host these translations. They are part of the overall Domain Name System. To learn how threat actors can abuse DNS protocols, read up on <a href="https://blog.malwarebytes.com/threats/dns-hijacker/" target="_blank" rel="noopener noreferrer">DNS hijackers</a>, a type of malware that modifies users&#8217; DNS settings.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Domain Name System Security Extensions (DNSSEC)</h3> <!-- wp:paragraph --><p>Domain Name System Security Extensions, abbreviated as DNSSEC, is a set of extensions that add extra security to the DNS protocol. For more information, see <a href="https://blog.malwarebytes.com/security-world/2017/02/dnssec-why-do-we-need-it/" target="_blank" rel="noopener">this blog post</a> on why we need DNSSEC.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Downloader</h3> <!-- wp:paragraph --><p>A downloader, or Trojan downloader, is <a href="https://www.malwarebytes.com/glossary/malware" rel="noopener">malware</a> with the sole intention of downloading other programs&mdash;usually more malware&mdash;to the affected system as soon as an Internet connection is available.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Dox</h3> <!-- wp:paragraph --><p>Dox is an informal abbreviation of the word &#8220;documents&#8221;. The term is used to describe the act of researching and disseminating private information about a person or organization. Many doxxers&mdash;those who dox&mdash;employ a number of techniques to gather information, such as searching the internet, hacking, and social engineering. Other form(s): doxing, doxxing</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Drive-by download</h3> <!-- wp:paragraph --><p>A drive-by download pertains to (1) the unintended download of one or more files, malicious or not, onto the user&#8217;s system without their consent or knowledge. It may also describe the download and installation of files bundled with a program that users didn&#8217;t sign up for.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Drive-by mining</h3> <!-- wp:paragraph --><p>Drive-by mining is a term coined to describe a method in which a piece of JavaScript code is embedded into a Web page to perform cryptocurrency mining on user machines that visit this page. For more information, see <a href="https://blog.malwarebytes.com/threat-analysis/2017/09/drive-by-mining-and-ads-the-wild-wild-west/" target="_blank" rel="noopener">this blog post</a> on drive-by mining and ads.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Dropper</h3> <!-- wp:paragraph --><p>A dropper, or Trojan downloader, is a type of <a href="https://www.malwarebytes.com/glossary/malware" rel="noopener">malware</a> that installs other malware on the affected system. The other malware is part of the same executable, which is usually in compressed form.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-D"> <h3>Dwell time</h3> <!-- wp:paragraph --><p>Dwell time refers to the amount of time passed from when <a href="https://www.malwarebytes.com/glossary/malware" rel="noopener">malware</a> has initially infiltrated a system to when it has been detected and removed.</p><!-- /wp:paragraph --> </div> <h2>E</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-E"> <h3>Electronic sports (eSports)</h3> <!-- wp:paragraph --><p>Electronic sports, or eSports, are basically video games competitions. Any computer- or console-game that has a multi-player competition qualifies as an eSport.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-E"> <h3>Encryption</h3> <!-- wp:paragraph --><p>Encryption is the process of changing data in a way that can not (easily) be undone (or decrypted) by parties that don&#8217;t have the decryption key. For more information, see <a href="https://blog.malwarebytes.com/cybercrime/2013/09/encryption-types-of-secure-communication-and-storage/" target="_blank" rel="noopener">this blog post</a> on encryption and types of secure communication and storage.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-E"> <h3>End-user</h3> <!-- wp:paragraph --><p>The end-user is the person that a specific product is designed, developed, and created for. For this intended user, the product should be suitable (ease of use), and it should be a finished product.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-E"> <h3>Endpoint detection and response (EDR)</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/cybersecurity/business/what-is-edr">Endpoint Detection and Response (EDR)</a>&nbsp;or Endpoint Threat Detection and Response (ETDR) is a kind of integrated endpoint security solution which uses telemetry data to detect, analyze, and remediate cyberthreats. <a href="https://www.malwarebytes.com/business/edr">EDR security</a> helps prevent cyberattacks on organizations.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-E"> <h3>Endpoint Security</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/cybersecurity/business/what-is-endpoint-protection">Endpoint Security</a>&nbsp;includes cybersecurity measures to protect end-user devices (or endpoints) from attacks and data breaches on your organization.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-E"> <h3>Enterprise Resource Planning (ERP)</h3> <!-- wp:paragraph --><p>An ERP is a suite of business management software that allows companies to collect, store, manage, and interpret data coming from multiple departments.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-E"> <h3>EternalBlue</h3> <!-- wp:paragraph --><p>EternalBlue is one of the handful of &#8220;exploitation tools&#8221; leaked by a group called The Shadow Brokers (TSB) that take advantage of weaknesses in how Windows implemented the <a href="https://www.malwarebytes.com/glossary/server-message-block-smb" rel="noopener noreferrer">Server Message Block (SMB)</a> protocol. The <a href="https://blog.malwarebytes.com/detections/ransom-wannacrypt/" target="_blank" rel="noopener noreferrer">WannaCry</a> and NotPetya ransomware strains used this exploit to target unpatched systems. For more information, see <a href="https://blog.malwarebytes.com/101/2018/12/how-threat-actors-are-using-smb-vulnerabilities/" target="_blank" rel="noopener noreferrer">this blog post</a> on how threat actors are using SMB vulnerabilities in their attack campaigns.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-E"> <h3>EternalChampion</h3> <!-- wp:paragraph --><p>EternalChampion is one of the handful of &#8220;exploitation tools&#8221; leaked by a group called The Shadow Brokers (TSB) that take advantage of weaknesses in how Windows implemented the <a href="https://www.malwarebytes.com/glossary/server-message-block-smb" rel="noopener noreferrer">Server Message Block (SMB)</a> protocol. EternalChampion particularly exploits a race condition in how SMB handles a transaction. TrickBot is an infamous banking Trojan known to use EternalChampion to spread laterally. More information can be found in our blogs: <a href="https://blog.malwarebytes.com/101/2018/11/trickbot-takes-top-business-threat/" target="_blank" rel="noopener noreferrer">TrickBot takes over as top business threat</a> and <a href="https://blog.malwarebytes.com/101/2018/12/how-threat-actors-are-using-smb-vulnerabilities/" target="_blank" rel="noopener noreferrer">How threat actors are using SMB vulnerabilities</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-E"> <h3>EternalRomance</h3> <!-- wp:paragraph --><p>EternalRomance is one of the handful of &#8220;exploitation tools&#8221; leaked by a group called The Shadow Brokers (TSB) that take advantage of weaknesses in how Windows implemented the <a href="https://www.malwarebytes.com/glossary/server-message-block-smb" rel="noopener noreferrer">Server Message Block (SMB)</a> protocol. Successful exploitation results in a <a href="https://www.malwarebytes.com/glossary/remote-code-execution-rce-attack" rel="noopener noreferrer">remote code execution (RCE) attack</a>. The <a href="https://www.malwarebytes.com/glossary/ransomware" rel="noopener noreferrer">ransomware</a> strain known as BadRabbit has used EternalRomance in its campaign. More information can be found in our blogs: <a href="https://blog.malwarebytes.com/threat-analysis/2017/10/badrabbit-closer-look-new-version-petyanotpetya/" target="_blank" rel="noopener noreferrer">BadRabbit: a closer look at the new version of Petya/NotPetya</a> and <a href="https://blog.malwarebytes.com/101/2018/12/how-threat-actors-are-using-smb-vulnerabilities/" target="_blank" rel="noopener noreferrer">How threat actors are using SMB vulnerabilities</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-E"> <h3>Ethernet</h3> <!-- wp:paragraph --><p>Ethernet is a networking technology commonly used in various networks, such as <a href="https://www.malwarebytes.com/glossary/local-area-network" rel="noopener noreferrer">LAN</a>, MAN, and WAN. It is so commonplace that most PC motherboards have a built-in Ethernet interface.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-E"> <h3>Executable and Link format (ELF)</h3> <!-- wp:paragraph --><p>An ELF file is an executable file format for the Linux and Unix platforms. Its known file extensions are <em>.axf</em>, <em>.bin</em>, <em>.elf</em>, <em>.o</em>, <em>.prx</em>, <em>.puff</em>, <em>.ko</em>, <em>.mod</em>, and <em>.so</em>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-E"> <h3>Exploit</h3> <!-- wp:paragraph --><p>Exploits are a type of malware that takes advantage of bugs and vulnerabilities in a system in order to allow the exploit&#8217;s creator to take control. For an in-depth look at exploits, see <a href="https://www.malwarebytes.com/exploits" rel="noopener noreferrer">this page</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-E"> <h3>Exploit kit</h3> <!-- wp:paragraph --><p>An exploit kit is a packaged collection of exploits for use by criminal gangs in spreading malware. Synonym: Exploit pack</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-E"> <h3>Extended Validation SSL Certificate (EV SSL)</h3> <!-- wp:paragraph --><p>An Extended Validation SSL Certificate is an identity authentication solution used in HTTPS websites that tells users that the owner or operator of the site they&#8217;re interacting with is legitimate. A green bar displayed in the address bar denotes the presence of an EV SSL.</p><!-- /wp:paragraph --> </div> <h2>F</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-F"> <h3>Family</h3> <!-- wp:paragraph --><p>In computer security, a family refers to a group of <a href="https://www.malwarebytes.com/glossary/malware" rel="noopener">malware</a> <a href="https://www.malwarebytes.com/glossary/variant" rel="noopener">variants</a> that all exhibit at least one base characteristics.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-F"> <h3>Fear, uncertainty, and doubt (FUD)</h3> <!-- wp:paragraph --><p>Fear, uncertainty, and doubt is a disinformation strategy that is used as a weapon against competitors. In hacking, FUD could also mean &#8220;fully undetected,&#8221; which means (1) that data that is made to appear like random noise due to encryption, or (2) a piece of software that cannot be detected by AV tools and scanners.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-F"> <h3>File type</h3> <!-- wp:paragraph --><p>A file type is a name given to a specific kind of file. For example, a Microsoft Excel sheet file and a Python script file are two different file types. A file type is not the same as a file format.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-F"> <h3>File-based attack</h3> <!-- wp:paragraph --><p>A file-based attack is an attack where <a href="https://www.malwarebytes.com/glossary/threat-actor" rel="noopener">threat actors</a> use certain file types, usually those bearing document file extensions like .DOCX and .PDF, to entice users to open them. The file in question is embedded with malicious code; thus, once opened, this code is also executed.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-F"> <h3>Fingerprinting</h3> <!-- wp:paragraph --><p>Fingerprinting refers to the process of gathering information about a system at first contact. It is commonly used by <a href="https://www.malwarebytes.com/glossary/malware">malware</a> to determine whether a system is vulnerable to certain attacks.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-F"> <h3>Firewall</h3> <!-- wp:paragraph --><p>A <a href="https://www.malwarebytes.com/cybersecurity/business/what-is-firewall">firewall</a> is a network security system that monitors incoming and outgoing data packets and through preconfigured rules, blocks unwanted inbound and outbound network traffic. Types of firewalls include software, hardware, cloud-native, or software as a service (SaaS) firewalls which can prevent cyber intrusions on your business.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-F"> <h3>Firmware</h3> <!-- wp:paragraph --><p>Firmware is software that is written to a hardware device&#8217;s memory. It is used to run user programs on said devices.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-F"> <h3>Foothold expansion</h3> <!-- wp:paragraph --><p>Foothold expansion is the act of creating backdoors that are used to re-enter a network after its initial infiltration.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-F"> <h3>Fraud</h3> <!-- wp:paragraph --><p>Fraudulent websites appear to be one thing, like a tech support site, a dating site, or a shopping site with illegal products or great deals, but they&#8217;re really scams to try to steal your information or credit card details.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-F"> <h3>Freeware</h3> <!-- wp:paragraph --><p>Freeware is software that comes without a cost. Some freeware may give the option of voluntary payments to the developer, which is typically be called donationware.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-F"> <h3>Frequently asked questions (FAQ)</h3> <!-- wp:paragraph --><p>Frequently asked questions, or FAQ, is a list drawn up around a particular subject of commonly asked questions and their answers. This list is often the first line of support for many products and answers many of the issues that users may have.</p><!-- /wp:paragraph --> </div> <h2>G</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-G"> <h3>General Data Protection Regulation (GDPR)</h3> <!-- wp:paragraph --> <p>The General Data Protection Regulation is the standard data protection law affecting the European Union and its citizens that puts strict regulations on organizations on how <a href="https://www.malwarebytes.com/cybersecurity/basics/pii">personally identifiable information (PII)</a> are to be controlled, processed, and stored. For more information, see <a href="https://blog.malwarebytes.com/101/2017/10/make-way-for-the-gdpr-is-your-business-ready/" target="_blank" rel="noopener">this post</a> on how businesses can adequately assess their readiness to GDPR.</p> <!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-G"> <h3>Globally unique identifier (GUID)</h3> <!-- wp:paragraph --><p>A globally unique identifier is a unique number created by Microsoft applications to identify components, hardware, files, user accounts, etc.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-G"> <h3>Graphical user interface (GUI)</h3> <!-- wp:paragraph --><p>A graphical user interface, or GUI, is a type of interface that helps a user to control and manipulate software. The alternative is command line programs, which is generally perceived as challenging to understand and learn.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-G"> <h3>Graymail</h3> <!-- wp:paragraph --><p>Graymail is bulk solicited email that users opted-in to receiving at first, but after losing interest, just accumulates in the inbox until recipients decide to opt-out or report them as spam.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-G"> <h3>Greyware</h3> <!-- wp:paragraph --><p>Greyware is a classification of software that generally does annoying, disruptive, or undesirable tasks but not to the point of being malicious. Other forms: Grayware</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-G"> <h3>Griefing</h3> <!-- wp:paragraph --><p>In video gaming, particularly in MMORPG circles, griefing is the deliberate act of annoying, irritating, and generally causing other players grief. This is done by attacking and terminating other characters and destroying player property among others.</p><!-- /wp:paragraph --> </div> <h2>H</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-H"> <h3>Hacker</h3> <!-- wp:paragraph --><p>A hacker is a person that has a profound understanding of particular systems or processes. Their knowledge enables them to use those subjects for other purposes than what they were initially designed for. For an in-depth look at hackers, see <a href="https://www.malwarebytes.com/hacker" rel="noopener noreferrer">this page</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-H"> <h3>Hacktivism</h3> <!-- wp:paragraph --><p>Hacktivism is a portmanteau of &#8220;hacking&#8221; and &#8220;activism&#8221;. Hacktivism is the defacement of a website where the compromise isn&#8217;t as significant as the statement the hackers make through it.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-H"> <h3>Hacktivist</h3> <!-- wp:paragraph --><p>Hacktivist is a combination of &ldquo;hack&rdquo; and &ldquo;activist.&rdquo; A hacktivist is someone who breaks into computer systems (hacking) for the purpose of political or social activism. Hacktivists may work alone or in groups.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-H"> <h3>Hash value</h3> <!-- wp:paragraph --><p>A hash value is an alphanumeric string that uniquely identifies data or files. MD5, SHA-1, and SHA-2 are three of its known algorithms. Synonym: Hash code</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-H"> <h3>Heap spray</h3> <!-- wp:paragraph --><p>In the context of computer security, a heap spray is an old technique that allows vulnerable systems to be taken advantaged of easily. This happens when <a href="https://www.malwarebytes.com/glossary/threat-actor" rel="noopener noreferrer">threat actors</a> write to the heap&mdash;a predetermined location in the computer&#8217;s memory&mdash;for a running program. This task of writing is often referred as &#8220;spraying the heap&#8221;. And then, at a later time, these same attackers will take advantage of a vulnerability to cause the exploit code to call commands in the heap. Other form(s): Heap spraying</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-H"> <h3>Heap spraying</h3> <!-- wp:paragraph --><p>Heap spraying is a technique wherein code is written in various places in the heap (memory allocated for the use of programs) for malicious software to refer to at a later date, giving exploits a higher chance of success. Other forms: Heap spray, &#8220;spraying the heap&#8221;</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-H"> <h3>Heartbleed</h3> <!-- wp:paragraph --><p>Heartbleed is the term used to refer to a vulnerability in some OpenSSL implementations. This vulnerability&#8217;s official identifier is <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160" target="_blank" rel="noopener noreferrer">CVE-2014-0160</a>. For more information, see <a href="https://blog.malwarebytes.com/exploits-and-vulnerabilities/2019/09/everything-you-need-to-know-about-the-heartbleed-vulnerability/" target="_blank" rel="noopener noreferrer">this blog post</a> on systems still unpatched five years after Heartbleed&#8217;s discovery.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-H"> <h3>HermeticWiper</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/cybersecurity/business/what-is-hermetic-wiper">HermeticWiper</a>&nbsp;is a&nbsp;new kind of malware which was named based on the stolen digital certificate used to carry out attacks.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-H"> <h3>Heuristic analysis</h3> <!-- wp:paragraph --><p>Heuristic analysis is a scanning technique used by many antivirus programs wherein they look for certain malicious behaviors from potentially new and undetected variants. Other forms: Heuristics</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-H"> <h3>Hibernation</h3> <!-- wp:paragraph --><p>Is a state of inactivity to save energy. In computing this expression is used for powering down a computer while preserving the state it is in. The content of the RAM (Random Access Memory) is saved to a drive (usually the main hard disk of the system) and will be restored in RAM as soon as the system is brought back out of hibernation. Not to be confused with sleep mode, which is another energy saving method that uses a little energy to keep the data in RAM. The advantage of sleep mode is that the system is ready for use almost instantaneously where waking from hibernation takes some time.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-H"> <h3>Hijacker</h3> <!-- wp:paragraph --><p>A hijacker is a type of malware that modifies a web browser&#8217;s settings without users&#8217; permission, usually to inject unwanted ads into the browser or redirect to scam sites. Synonyms: browser hijacker</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-H"> <h3>Hoax</h3> <!-- wp:paragraph --><p>A hoax is a term we use to generally describe a fake or false warning. For more information, see <a href="https://blog.malwarebytes.com/cybercrime/2013/03/hoaxes/" target="_blank" rel="noopener">this blog post</a> on a more in-depth look at hoaxes. Synonyms: scams and shams</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-H"> <h3>Homograph</h3> <!-- wp:paragraph --><p>A homograph is, by definition, a word of the same written form as another but of different meaning and usually origin, whether pronounced the same way or not. But in cybersecurity, this is expanded to include words that look the same.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-H"> <h3>Homograph attacks</h3> <!-- wp:paragraph --><p>A homograph attack is a method of deception wherein a <a href="https://www.malwarebytes.com/glossary/threat-actor" rel="noopener">threat actor</a> leverages on the similarities of character scripts to create and register phony domains of existing ones to fool users and lure them into visiting. For more information, see <a href="https://blog.malwarebytes.com/101/2017/10/out-of-character-homograph-attacks-explained/" target="_blank" rel="noopener">this blog post</a> on an in-depth look at homograph attacks. Synonym: homoglypth attacks, Punycode attack, script spoofing, homograph domain name spoofing</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-H"> <h3>Host Intrusion Prevention System (HIPS)</h3> <!-- wp:paragraph --><p>A Host Intrusion Prevention System, or HIPS, is a software package that monitors for suspicious activities occurring within a host machine. For more information, see <a href="https://blog.malwarebytes.com/101/2013/05/whatiships/" target="_blank" rel="noopener">this blog post</a> on how HIPS work.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-H"> <h3>Host-based solution</h3> <!-- wp:paragraph --><p>A host-based solution refers to software that is installed in end-point systems as opposed to a centralized solution.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-H"> <h3>Hyper-Text Transfer Protocol (HTTP)</h3> <!-- wp:paragraph --><p>The Hyper-Text Transfer Protocol is a set of underlying rules used in the World Wide Web, defining how files are transferred and formatted, and how web servers and internet browsers should respond to specific commands.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-H"> <h3>Hyper-Text Transfer Protocol Secure (HTTPS)</h3> <!-- wp:paragraph --><p>In a nutshell, Hyper-Text Transfer Protocol Secure is secure <a href="https://www.malwarebytes.com/glossary/hyper-text-transfer-protocol-http" rel="noopener">HTTP</a>. This means that file transference and communication over the network is protected due to encryption on both the server side and the client side.</p><!-- /wp:paragraph --> </div> <h2>I</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-I"> <h3>Identity and access management (IAM)</h3> <!-- wp:paragraph --><p>Identity and access management (IAM) is a collective term pertaining to processes, services, and technologies that allow the right individuals and groups to access the right resources within a network.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-I"> <h3>Identity theft</h3> <!-- wp:paragraph --><p>Identity theft is an electronic and real-world crime of deliberately using someone else&#8217;s information to commit fraud. Usually, identity thieves are financially motivated, consequently disadvantaging their target.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-I"> <h3>Incident scope</h3> <!-- wp:paragraph --><p>In a malware attack against enterprises, an incident scope generally refers to the extent of damage against the organization, how much data has been stolen, what the attack surface is, and how much it&nbsp;would cost them to resolve the attack and prevent it from happening again in the future.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-I"> <h3>Indicator of Attack (IOA)</h3> <!-- wp:paragraph --><p>Indicators of attack (IOA) is defined as the intentions motivating a cyberattack and focuses on the techniques bad actors use to accomplish objectives.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-I"> <h3>Indicator of compromise (IOC)</h3> <!-- wp:paragraph --><p>Indicators of compromise, or IOC, can be found after a system intrusion. These indicators can be IP addresses, domains, hashes of malware files, virus signatures, and similar artifacts.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-I"> <h3>Infection vector</h3> <!-- wp:paragraph --><p>In cybersecurity, an infection vector refers to the transmission channel of a malware. To know this, ask &#8220;How did the malware arrive on my computer/network?&#8221; &nbsp; Learn more: <a href="https://www.malwarebytes.com/malware">Malware</a> <a href="https://www.malwarebytes.com/antivirus">Antivirus</a> &nbsp;</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-I"> <h3>Information Technology (IT)</h3> <!-- wp:paragraph --><p>Information Technology, or IT, is the study or the use of systems for storing, retrieving, and sending information.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-I"> <h3>Initial access brokers (IABs)</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/blog/business/2022/11/initial-access-brokers-iabs-3-ways-they-break-into-corporate-networks-and-how-to-detect-them">Initial access brokers (IABs)</a>&nbsp;are a type of cybercriminal group that sell unauthorized access to corporate networks. IAB attacks target organizations through phishing, password guessing, and exploiting <a href="https://www.malwarebytes.com/glossary/software-vulnerability">vulnerabilities</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-I"> <h3>Injection attacks</h3> <!-- wp:paragraph --><p>Injection attacks is a broad term referring to a certain attack vector. Usually, malicious code is used in such attacks; but generally speaking, attackers provide input that, once interpreted, alters the execution or outcome of a program. Injection attacks have several types. They include:</p><!-- /wp:paragraph --> <!-- wp:list --><ul> <!-- wp:list-item --><li><a href="https://www.malwarebytes.com/glossary/cross-site-scripting-xss" rel="noopener noreferrer">Cross-site scripting (XSS)</a></li><!-- /wp:list-item --> <!-- wp:list-item --><li><a href="https://www.malwarebytes.com/glossary/sql-injection" rel="noopener noreferrer">SQL injection</a></li><!-- /wp:list-item --> </ul><!-- /wp:list --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-I"> <h3>Input/Output (I/O)</h3> <!-- wp:paragraph --><p>Input/Output, or I/O, is an expression used to describe any information exchange between a computer system and the outside world. Usually, an I/O is illustrated (but are not limited to) as the traffic between a system and peripheral devices.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-I"> <h3>Intellectual property</h3> <!-- wp:paragraph --><p>Intellectual property refers to creations of the mind, whether they are inventions, art, designs, names, or commercial images. Laws on intellectual property differ from one country to the other, but they usually protect the rights of the person or company that first successfully claims coming up with the creation.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-I"> <h3>Internationalized domain names (IDN)</h3> <!-- wp:paragraph --><p>Internationalized domain names, or IDN, is a domain name containing at least one non-<a href="https://www.malwarebytes.com/glossary/american-standard-code-for-information-interchange" rel="noopener">ASCII</a> character. They enable internet users from all over the world can create and register domain names using their own native language.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-I"> <h3>Internet of things (IoT)</h3> <!-- wp:paragraph --><p>The internet of things, or IoT, represents a host of internet-connected devices that do not require direct human input. For more information, see <a href="https://blog.malwarebytes.com/101/2017/12/internet-things-iot-security-never/" target="_blank" rel="noopener">this blog post</a> on what an IoT security is and what it should never be.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-I"> <h3>Internet Service Provider (ISP)</h3> <!-- wp:paragraph --><p>An ISP is a company that provides users with internet services, such as basic connections, broadband, web hosting, and a range of other services.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-I"> <h3>Intranet</h3> <!-- wp:paragraph --><p>An intranet is a private network with restricted access. It is usually set up by or for a company that only to the members of the company can access.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-I"> <h3>Intrusion Prevention System (IPS)</h3> <!-- wp:paragraph --><p>An Intrusion Prevention System, or IPS, monitor network traffic to determine whether a security breach or <a href="https://www.malwarebytes.com/glossary/malware" rel="noopener">malware</a> infection has taken place. When applicable, they can intervene in such cases as pre-determined by the network administrator to avoid further damage.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-I"> <h3>IP address</h3> <!-- wp:paragraph --><p>An IP address is a number assigned to each system that is participating in a network using the Internet Protocol, such as the World Wide Web. Read in-depth article about <a href="https://www.malwarebytes.com/what-is-ip-address">what IP address is</a> and how to protect your IP address.&nbsp;</p><!-- /wp:paragraph --> </div> <h2>J</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-J"> <h3>Jailbreak</h3> <!-- wp:paragraph --><p>In computing, to jailbreak means to modify a device, usually a smartphone, by removing any restrictions imposed by the device manufacturer, such as the downloading and installation of unauthorized software or apps from third-party markets. Other forms: jailbreaking</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-J"> <h3>Joke programs</h3> <!-- wp:paragraph --><p>A joke program is a file that may not have a malicious payload but may inconvenience the user in another way. For example, it might play loud audio files, or pop up a funny video, or move the mouse cursor around the desktop.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-J"> <h3>Juice jacking</h3> <!-- wp:paragraph --><p>Juice jacking is a cyberattack against unsuspecting targets via their mobile devices. This happens when the target plugs their device into a USB port to charge; however, the charging port also functions as a data connection, so threat actors can abuse this. Malware could be introduced to the device via the USB port or the USB cable itself, or sensitive information could be quietly retrieved from the device.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-J"> <h3>Junk mail</h3> <!-- wp:paragraph --><p>Junk mail is, essentially, email spam.</p><!-- /wp:paragraph --> </div> <h2>K</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-K"> <h3>Key generator</h3> <!-- wp:paragraph --><p>A key generator, or popularly known as keygen, is a piece of software that generates random keys&mdash;usually software product keys&mdash;for the purpose of letting the user activate and operate a program without them actually purchasing it.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-K"> <h3>Keylogger</h3> <!-- wp:paragraph --><p>In the context of malware, a keylogger is a type of Trojan spyware that is capable of stealing or recording user keystrokes. You can learn more at our dedicated <a href="https://www.malwarebytes.com/keylogger" rel="noopener noreferrer">keylogger page</a>.&nbsp;Other forms: keylogger, keylogging Synonyms: keystroke logger, system monitor</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-K"> <h3>Keystream</h3> <!-- wp:paragraph --><p>In cryptography, a keystream is a stream of random or pseudorandom characters you combine with plaintext to make a cyphertext.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-K"> <h3>Keystroke</h3> <!-- wp:paragraph --><p>A keystroke is one stroke of any key on a machine operated by a keyboard, such as a typewriter or a computer terminal. Sometimes keystrokes per hour (KSPH) or keystrokes per minute (KSPM) are used as a standard of typing speed.</p><!-- /wp:paragraph --> </div> <h2>L</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-L"> <h3>Latency</h3> <!-- wp:paragraph --><p>In computing, latency generally means a time delay from system input to desired output. This can be defined differently, depending on context.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-L"> <h3>Lateral movement</h3> <!-- wp:paragraph --><p>Lateral movement refers to various techniques and/or tactics that <a href="https://www.malwarebytes.com/glossary/threat-actor" rel="noopener">threat actors</a> use that allow them to move through a network to access or search for critical assets and data within a network. At times, they employ this to control remote systems.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-L"> <h3>Layered Service Provider (LSP)</h3> <!-- wp:paragraph --><p>A Layered Service Provider (LSP) is a Windows feature that allows software to tap into data flowing through the network. It can intercept, filter, and even modify all the traffic between the internet and a system&#8217;s applications. For more information, see <a href="https://blog.malwarebytes.com/cybercrime/2014/10/changes-in-the-lsp-stack/" target="_blank" rel="noopener noreferrer">this blog post</a> for an overview on how legit and illegitimate programs use LSPs.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-L"> <h3>Linux</h3> <!-- wp:paragraph --><p>Linux is a favorite and most used free, open-sourced <a href="https://www.malwarebytes.com/glossary/operating-system-os" rel="noopener">operating system</a> to date. This term also denotes a family of OS distributions (or distro) built around the Linux kernel.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-L"> <h3>Local administrator privilege</h3> <!-- wp:paragraph --><p>A local administrator privilege refers to administrator privileged access to a specific machine within a network, allowing an owner to make system configurations, install and uninstall software, and use other <a href="https://www.malwarebytes.com/glossary/operating-system-os" rel="noopener">OS</a> components.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-L"> <h3>Local administrator privileges</h3> <!-- wp:paragraph --><p>Refers to administrator access to a specific machine within a network, allowing an owner to make system configurations, install and uninstall software, and use other privileged <a href="https://www.malwarebytes.com/glossary/operating-system-os">OS</a> components. The owner of the machine is usually (and by default) the administrator.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-L"> <h3>Local Area Network (LAN)</h3> <!-- wp:paragraph --><p>A Local Area Network, or LAN, is a network of computers and other devices spread over a relatively small space, e.g., a building or group of buildings. Usually, these devices all connect to a server or group of servers by <a href="https://www.malwarebytes.com/glossary/ethernet">ethernet</a> or <a href="https://www.malwarebytes.com/glossary/wi-fi" rel="noopener noreferrer">Wi-Fi</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-L"> <h3>Localhost</h3> <!-- wp:paragraph --><p>On any given system, the localhost refers to &#8220;This computer.&#8221; It uses the <a href="https://www.malwarebytes.com/glossary/ip-address" rel="noopener">IP address</a> <em>127.0.0.1</em> to use the loopback function to reach the resources stored on the system itself.</p><!-- /wp:paragraph --> </div> <h2>M</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>MAC address</h3> <!-- wp:paragraph --><p>A MAC address is your computer hardware&#8217;s unique number. MAC stands for Media Access Control.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Machine code</h3> <!-- wp:paragraph --><p>Machine code is the basic or fundamental language of computers. It is composed of binary numbers. Synonym: machine language</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Machine learning (ML)</h3> <!-- wp:paragraph --><p>Machine learning is a form or subset of <a href="https://www.malwarebytes.com/glossary/artificial-intelligence-ai" rel="noopener noreferrer">artificial intelligence (AI)</a> where computers make use of large data sets and statistical techniques to improve at specific tasks without being manually reprogrammed.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Machine-to-machine (M2M)</h3> <!-- wp:paragraph --><p>Machine-to-machine (M2M) is any technology that allows for the communication of machines without a human aid. <a href="https://www.malwarebytes.com/glossary/artificial-intelligence-ai" rel="noopener noreferrer">Artificial intelligence (AI)</a> and <a href="https://www.malwarebytes.com/glossary/machine-learning-ml" rel="noopener noreferrer">machine learning (ML)</a> usually facilitates this exchange.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Macro</h3> <!-- wp:paragraph --><p>Macro is a set of commands that application users group together and save, so they can execute it with a single command or keystroke.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Macro virus</h3> <!-- wp:paragraph --><p>A macro virus is malware written in the same macro language used in software applications, examples of which are Microsoft Word and Microsoft Excel.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Madware</h3> <!-- wp:paragraph --><p>Madware is aggressive advertising on mobile devices, particularly tablets and smartphones.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Magecart</h3> <!-- wp:paragraph --><p>Magecart is the collective name given to several groups of online criminals who engage in <a href="https://www.malwarebytes.com/glossary/web-skimmer" rel="noopener noreferrer">web skimming</a>. They usually target the Magento system, a highly popular e-commerce platform, of online shops to steal customer payment card information.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Mail bomb</h3> <!-- wp:paragraph --><p>&#8220;Mail bomb&#8221; is a verb pertaining to the act of sending too much email to a person, group, or systems. Other form(s): Mail bombing</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Malicious/Destructive payload</h3> <!-- wp:paragraph --><p>Simply known as <em>payload</em>, this refers to a portion of malware that performs its malicious activity. A payload can be as benign as changing an affected system&#8217;s desktop screensaver or as destructive as deleting key <a href="https://www.malwarebytes.com/glossary/operating-system-os" rel="noopener noreferrer">operating system (OS)</a> files.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Malspam</h3> <!-- wp:paragraph {"className":"p1"} --><p class="p1"><span class="s1">Malspam, short for malware spam or malicious spam, is spam email that delivers malware. While regular spam is simply any unsolicited email, malspam contains infected attachments, phishing messages, or malicious URLs. It can also deliver a myriad of malware types, including ransomware, Trojans, bots, info-stealers, cryptominers, spyware, and keyloggers.</span></p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Malvertising</h3> <!-- wp:paragraph --><p>Malvertising, or &#8220;malicious advertising,&#8221; is the use of online advertising to distribute malware with little to no user interaction required. More information can be found in our blogs: <a href="https://blog.malwarebytes.com/101/2015/02/what-is-malvertising/" target="_blank" rel="noopener noreferrer">What is malvertising?</a> and <a href="https://blog.malwarebytes.com/101/2016/06/truth-in-malvertising-how-to-beat-bad-ads/" target="_blank" rel="noopener noreferrer">Truth in malvertising: How to beat bad ads</a>. For an in-depth look at malvertising, see <a href="https://www.malwarebytes.com/malvertising" rel="noopener noreferrer">this page</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Malware</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/malware">Malware</a>, or &#8220;malicious software,&#8221; is an umbrella term that refers to any malicious program or code that is harmful to systems. For an in-depth look at malware, see <a href="https://www.malwarebytes.com/malware" rel="noopener noreferrer">this page</a>.</p><!-- /wp:paragraph --> <!-- wp:paragraph --><p>Download our&nbsp;<a href="https://www.malwarebytes.com/mwb-download">free antivirus</a>&nbsp;to protect yourself from viruses and malware.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Man-in-the-Browser (MitB)</h3> <!-- wp:paragraph --><p>A man in the browser is a form of <a href="https://www.malwarebytes.com/glossary/man-in-the-middle-mitm">Man-in-the-Middle (MiTM)</a> attack wherein malware&mdash;usually a <a href="https://www.malwarebytes.com/glossary/trojan">Trojan</a>&mdash;is used to intercept and manipulate communication between the internet browser and its mechanisms or libraries to commit fraud. Other forms of abbreviation include: MIB, MiB, MITB</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Man-in-the-Middle (MitM)</h3> <!-- wp:paragraph --><p>In cybersecurity, a Man-in-the-Middle (MitM) attack happens when a&nbsp;<a href="https://blog.malwarebytes.com/glossary/threat-actor/" target="_blank" rel="noopener">threat actor</a>&nbsp;manages to intercept and forward the traffic between two entities without either of them noticing. In addition, some MitM attacks alter the communication between parties, again without them realizing. To pull this off, the&nbsp;attacker should not only be convincing in&nbsp;their impersonation&nbsp; but also be able to follow and influence the conversation between two or more parties. A MitM attack can be done between browser and Internet, for example, or between a Wi-Fi hotspot and an Internet user. </p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Managed Detection and Response (MDR)</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/cybersecurity/business/what-is-mdr">Managed Detection and Response (MDR)</a> is described as an outsourced service that delivers 24/7 managed threat hunting, monitoring, and incident response, which combines cybersecurity technology and human expertise.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Managed service provider (MSP)</h3> <!-- wp:paragraph --><p>A managed service provider (MSP) is a company that proactively offers remote support to a client&#8217;s IT infrastructure or endpoints. Oftentimes, this term is used interchangeably with &#8220;cloud service provider&#8221;.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Master Boot Record (MBR)</h3> <!-- wp:paragraph --><p>Typically, the Master Boot Record (MBR) is the first sector on a startup drive or other partitioned media. It contains a bootloader, an executable code that works as a loader for the <a href="https://www.malwarebytes.com/glossary/operating-system-os" rel="noopener noreferrer">OS</a>. For more information, see <a href="https://blog.malwarebytes.com/101/2014/09/meet-the-master-boot-record/" target="_blank" rel="noopener noreferrer">this blog post</a> for a deep dive on MBRs. Synonyms: partition sector, master partition table</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Memory dump</h3> <!-- wp:paragraph --><p>A memory dump is content of a system&#8217;s <a href="https://www.malwarebytes.com/glossary/random-access-memory-ram" rel="noopener noreferrer">RAM (random access memory)</a> created at a specific point in time. This is usually done at the moment of a program crash or system failure and used to diagnose the problem. However, this can also be made manually for memory forensics, such as investigating advanced malware (e.g. <a href="https://blog.malwarebytes.com/cybercrime/2016/03/fileless-infections-an-overview/" target="_blank" rel="noopener noreferrer">fileless</a>).</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Memory resident</h3> <!-- wp:paragraph --><p>A memory resident program possesses the ability to remain in memory, and can be a common trait of certain pieces of malware.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Metadata</h3> <!-- wp:paragraph --><p>Metadata is data about data. It gives background information, such as origin, relevance, and creation, about data. Examples are geotags in media files (say, where was a photograph taken) and author and data modified in document files.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Metropolitan area network (MAN)</h3> <!-- wp:paragraph --><p>A metropolitan area network (MAN) is a network of <a href="https://www.malwarebytes.com/glossary/local-area-network" rel="noopener noreferrer">LANs</a>. It spans an entire campus or an entire city, but it&#8217;s smaller than a <a href="https://www.malwarebytes.com/glossary/wide-area-network-wan" rel="noopener noreferrer">WAN</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Middelware</h3> <!-- wp:paragraph --><p>Middleware is software that sits between the <a href="https://www.malwarebytes.com/glossary/operating-system-os" rel="noopener noreferrer">OS</a> and the software it runs, thus the name. Middleware provides additional services to these software that the OS cannot. For example, middleware allows users to submit a form on a web browser, or allows a server to return results based on user queries.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Miner</h3> <!-- wp:paragraph --><p>Miner is also known as cryptocurrency miner. This is a form of malware that uses the resources of an infected system to mine cryptocurrency (e.g. Bitcoins) for the <a href="https://www.malwarebytes.com/glossary/threat-actor" rel="noopener noreferrer">threat actor</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Mitigation</h3> <!-- wp:paragraph --><p>In computing, mitigation is the process or act of containing the impact and/or risk from an attack. <a href="https://www.malwarebytes.com/glossary/remediation" rel="noopener noreferrer">Remediation</a> usually follows mitigation.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>MITRE ATT&#038;CK Framework</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/cybersecurity/business/what-is-mitre-attack-framework">MITRE ATT&amp;CK</a> stands for MITRE Adversarial Tactics, Techniques, and Common Knowledge. MITRE ATT&amp;CK framework serves as a public resource and guidance library for enterprises to better understand adversarial behavior and how the most effective and prolific attack groups infiltrate networks.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Mixed reality</h3> <!-- wp:paragraph --><p>Mixed reality is a piece of technology that marries the physical and the virtual worlds through by combining <a href="https://www.malwarebytes.com/glossary/virtual-reality" rel="noopener noreferrer">virtual reality (VR)</a> and <a href="https://www.malwarebytes.com/glossary/augmented-reality" rel="noopener noreferrer">augmented reality (AR)</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Mobile Security</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/cybersecurity/business/what-is-mobile-security">Mobile security</a> encompasses strategies, security architecture, and applications used to protect any portable device, including iPhones, Android phones, laptops, and tablets. Mobile device security involves efforts to help improve mobile device cybersecurity in order to safeguard consumers and companies from data breaches.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Money mule</h3> <!-- wp:paragraph --><p>A money mule is someone who is tricked into accepting money from scammers, keeping it in their account for a period of time, and then forwarding it on to a second account. For more information, see <a href="https://blog.malwarebytes.com/cybercrime/2017/12/children-and-young-adults-the-next-generation-money-mules/" target="_blank" rel="noopener">this blog post</a> on children and young adults as the next generation money mules. Other forms: Money muling, muling</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Multi-factor authentication (MFA)</h3> <!-- wp:paragraph --> <p>Multi-factor authentication (MFA) suggests using two or more authentication protocols. The most well-known MFA is two-factor authentication (2FA). Both represent the combination of more than one method of gaining access to a resource. For more information, see <a href="https://blog.malwarebytes.com/101/2017/01/understanding-the-basics-of-two-factor-authentication/" target="_blank" rel="noopener noreferrer">this blog post</a> on the basics of 2FA.</p> <!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Multi-tenancy</h3> <!-- wp:paragraph --><p>Muti-tenancy refers to a software architecture in which a single instance of software running in a server can cater to multiple users. A tenant is referred to here as the user.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Multimedia Messaging Service (MMS)</h3> <!-- wp:paragraph --><p>Multimedia Messaging Service (MMS) is an enhancement of the Short Message Service (SMS), which allows users to send longer messages (SMS is limited to 160 characters) accompanied by pictures, short videos, and audio over a cellular network.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Multiplatform</h3> <!-- wp:paragraph --><p>Multiplatform, or cross-platform, is an expression to describe software that has been developed to work on multiple <a href="https://www.malwarebytes.com/glossary/operating-system-os" rel="noopener">operating systems</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-M"> <h3>Mumblehard malware</h3> <!-- wp:paragraph --><p>Mumblehard malware is a type of <a href="https://www.malwarebytes.com/glossary/malware">malware</a> that specifically targets Linux and BSD servers, using spambots to compromise systems. It derived its name from the spam being &#8220;mumbled&#8221; out of affected systems and servers.</p><!-- /wp:paragraph --> </div> <h2>N</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-N"> <h3>National Cyber Security Centre (NCSC)</h3> <!-- wp:paragraph --><p>The National Cyber Security Centre (NCSC) is an organization in the United Kingdom that gives cyber security guidance and support to the public and private sectors. Its headquarters is in London.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-N"> <h3>National Institute of Standards and Technology (NIST)</h3> <!-- wp:paragraph --><p>The National Institute of Standards and Technology (NIST) is a unit of the US Commerce Department that promotes and maintains measurement standards. It was formerly known as the National Bureau of Standards.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-N"> <h3>National Security Agency (NSA)</h3> <!-- wp:paragraph --><p>The National Security Agency (NSA) is an intelligence agency of the US Department of Defense that monitors, processes, and collects information and data for the purpose of foreign and domestic intelligence and counterintelligence.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-N"> <h3>Near-field communication (NFC)</h3> <!-- wp:paragraph --><p>Near-field communication (NFC) is a short-range communication standard co-developed by Sony and Philips. Like <a href="https://www.malwarebytes.com/glossary/bluetooth" rel="noopener noreferrer">Bluetooth</a>, NFC is also a wireless means of doing <a href="https://www.malwarebytes.com/glossary/peer-to-peer" rel="noopener noreferrer">peer-to-peer (P2P)</a> data transfer without an internet connection. For NFC to work, two devices must either be touched together or be a few centimeters away of each other. A majority of modern smartphones come with NFC.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-N"> <h3>Net neutrality</h3> <!-- wp:paragraph --><p>Net neutrality is a concept, principle, or idea that <a href="https://www.malwarebytes.com/glossary/isp" rel="noopener noreferrer">ISPs</a>&nbsp;must treat all internet data equally, regardless of its kind, source, or destination. The term was first coined in 2002 by Tim Wu, a professor at Columbia Law School. Other form(s): network neutrality Synonym: internet neutrality</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-N"> <h3>Network</h3> <!-- wp:paragraph --><p>In computing, the definition of a network is a group of two or more computers or systems linked together. For example, your home network might consist of several devices that connect to a central router, including your desktop, gaming consoles, laptops, phones, and other Internet-connected gadgets. A prime property of networks is their topology, or the way they are laid out, connect to one another, and communicate with one another. The <a href="http://www.webopedia.com/quick_ref/topologies.asp" target="_blank" rel="noopener">main topologies</a>&nbsp;of networks are:</p><!-- /wp:paragraph --> <!-- wp:list --><ul> <!-- wp:list-item --><li>Mesh: every device, or node, is connected to one another. This is the most secure network that can handle the highest amount of traffic, but it&#8217;s also the most expensive.</li><!-- /wp:list-item --> <!-- wp:list-item --><li>Star: every device connects through a central hub. This allows for other nodes to stay online if one goes down, but if the central hub/server goes down, the entire network goes with it.</li><!-- /wp:list-item --> <!-- wp:list-item --><li>Bus: every device is connected by one cable that acts as the backbone of the network. This also allows for other nodes to stay online if one goes down, but any problems with the cable render the entire network useless. It&#8217;s the cheapest option, but not optimal for large networks.</li><!-- /wp:list-item --> <!-- wp:list-item --><li>Ring: every device is connected in a circular fashion, and the data travels in one direction. This configuration is easy to install and manage, and can handle large volumes of traffic. Expanding the network is time-consuming, however, and if one computer goes down, so does the network.</li><!-- /wp:list-item --> <!-- wp:list-item --><li>Tree: a hybrid topology that connects clusters of star networks to a single bus line. This helps to divide and manage a larger network, but can be just as easily taken down as a bus configuration.</li><!-- /wp:list-item --> </ul><!-- /wp:list --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-N"> <h3>Network perimeter</h3> <!-- wp:paragraph --><p>A network perimeter refers to the boundary between a private network and a public network, such as the World Wide Web.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-N"> <h3>Network segmentation</h3> <!-- wp:paragraph --><p>In computer networking, network segmentation is the practice of dividing a network into subnetworks to boost performance and improve security.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-N"> <h3>NewTab</h3> <!-- wp:paragraph --><p>NewTab is software that changes the default page of a new tab on the browser. This can result in similar negative effects and behavior to <a href="https://blog.malwarebytes.com/threats/toolbars/" target="_blank" rel="noopener">browser toolbars</a> or <a href="https://blog.malwarebytes.com/threats/browser-hijacker/" target="_blank" rel="noopener">browser hijackers</a>. NewTab can manipulate browser(s) to change their home page or search provider in order to hijack Internet traffic and inject advertisements.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-N"> <h3>Next Generation Antivirus (NGAV)</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/cybersecurity/business/what-is-next-generation-antivirus-ngav">Next-generation antivirus (NGAV) </a>provides a holistic approach to cybersecurity, leveraging a system of advanced technologies to stop known and new threats. NGAV proactively monitors and responds to a threat&#8217;s attacks, procedures, and techniques. It may also collect and analyze endpoint data.</p><!-- /wp:paragraph --> <!-- wp:paragraph --><p>Download our&nbsp;<a href="https://www.malwarebytes.com/mwb-download">free antivirus</a>&nbsp;to protect yourself from viruses and malware.</p><!-- /wp:paragraph --> </div> <h2>O</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-O"> <h3>Obfuscation</h3> <!-- wp:paragraph --><p>Obfuscation is when malware deliberately tries to obscure its true intent to potential victims, and/or attempts to hide portions of code from malware researchers performing analysis.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-O"> <h3>Open Systems Interconnection (OSI)</h3> <!-- wp:paragraph --><p>Open Systems Interconnection (OSI) is a model that defines a networking framework to implement protocols in seven layers:</p><!-- /wp:paragraph --> <!-- wp:list {"ordered":true} --><ol> <li>Physical</li> <li>Data Link</li> <li>Network</li> <li>Transport</li> <li>Session</li> <li>Presentation</li> <li>Application</li> </ol><!-- /wp:list --> <!-- wp:paragraph --><p>This model was designed by ISO (International Organization for Standardization) as a design template for building network systems. The lower layers deal with electrical signals, chunks of binary data, and routing of these data across networks. Higher levels cover network requests and responses, representation of data, and network protocols as seen from a user&#8217;s point of view.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-O"> <h3>OpenSSL</h3> <!-- wp:paragraph --><p>OpenSSL is a popular software cryptographic library for applications designed for secure communication over computer networks. It provides an open source implementation of the <a href="https://www.malwarebytes.com/glossary/secure-sockets-layer-ssl" rel="noopener noreferrer">Secure Sockets Layer (SSL)</a> and <a href="https://www.malwarebytes.com/glossary/transport-layer-security-tls" rel="noopener noreferrer">Transport Layer Security (TLS)</a> protocols.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-O"> <h3>Operating system (OS)</h3> <!-- wp:paragraph --><p>An operating system (OS) is software that supports a computer&#8217;s basic functions, such as executing applications, controlling peripherals, and scheduling tasks. The most well-known operating systems are Microsoft Windows, Linux, Apple macOS and iOS, Android, and Google&#8217;s Chrome OS.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-O"> <h3>Opportunistic attack</h3> <!-- wp:paragraph --><p>In contrast to a targeted attack, an opportunistic attack involves malware that is distributed in large numbers for anyone to download or injected into websites for anyone to access. Well-known methods are email and <a href="https://www.malwarebytes.com/glossary/exploit-kit" rel="noopener noreferrer">exploit kits</a>. Synonym: mass malware</p><!-- /wp:paragraph --> </div> <h2>P</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Packer</h3> <!-- wp:paragraph --><p>Packer is usually short for runtime packers. It is also known as self-extracting archives, which is software that unpacks itself in memory when the &ldquo;packed file&rdquo; is executed. Finally, this technique is also called executable compression. This type of compression was invented to make files smaller so that users wouldn&rsquo;t have to unpack them manually before they could be executed. However, given the current size of portable media and faster Internet speeds, the need for smaller files is not that urgent anymore. So when you see some packers being used nowadays, it is almost always for malicious purposes: to make reverse engineering more difficult, with the added benefit of a smaller footprint on the infected machine. For more information about this subject, have a look at the blog post <a href="https://blog.malwarebytes.com/cybercrime/malware/2017/03/explained-packer-crypter-and-protector/" target="_blank" rel="noopener">Explained: Packer, Crypter, and Protector.</a></p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Passcode</h3> <!-- wp:paragraph --><p>A passcode is essentially a short and simple <a href="https://www.malwarebytes.com/glossary/password" rel="noopener">password</a>. This could be the four-digit numerical code to unlock a smart phone or a banking PIN number, for example.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Passphrase</h3> <!-- wp:paragraph --><p>A passphrase is essentially a complex <a href="https://www.malwarebytes.com/glossary/password" rel="noopener">password</a> made up of a sequence of words. The difference between a passphrase and a regular password is that passphrases are more complex because of the presence of spaces and their longer lengths.</p><!-- /wp:paragraph --> <!-- wp:paragraph --><p>Check out our&nbsp;<a href="https://www.malwarebytes.com/password-generator">password generator&nbsp;</a>tool to create a strong password.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Password</h3> <!-- wp:paragraph --><p>In cybersecurity, a password is a method of authentication used to gain entry into an online account. Passwords are typically made up of a combination of letters and numbers, sometimes with special characters included. It&#8217;s generally understood that the longer a password is, the more secure it is. Username and password combinations have become popular modes of authentication due to their relative ease of use. However, the growing need for <a href="https://blog.malwarebytes.com/101/2017/05/dont-need-27-different-passwords/" target="_blank" rel="noopener">longer and more complex passwords</a>, each one unique for each online account, has diminished that ease of use a bit.</p><!-- /wp:paragraph --> <!-- wp:paragraph --><p>Check out our&nbsp;<a href="https://www.malwarebytes.com/password-generator">password generator&nbsp;</a>tool to create a strong password.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Password cracking</h3> <!-- wp:paragraph --><p>Password cracking, like&nbsp;<a href="https://www.malwarebytes.com/glossary/password-guessing" rel="noopener noreferrer">password guessing</a>, is another &#8220;brute force&#8221; method of attack against encrypted accounts or systems. However, it&#8217;s less about guessing and more about working with an acquired list of passwords hashes or the database itself. These hashes can be obtained via network sniffing.&nbsp;Check out our&nbsp;<a href="https://www.malwarebytes.com/password-generator">password generator&nbsp;</a>tool to create a strong password that is hard to crack.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Password cracking application</h3> <!-- wp:paragraph --><p>A password cracking application is typically a tool designed to recover a password from a system, or brute force its way in by manner of guessing the right password.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Password guessing</h3> <!-- wp:paragraph --><p>Password guessing is a &ldquo;brute force&rdquo; method of gaining access to an encrypted account or system by systematically guessing its password. Typically, a <a href="https://www.malwarebytes.com/glossary/dictionary-attack" rel="noopener noreferrer">dictionary type scheme</a>&nbsp;is used to do this. Guessing a password successfully is only possible in the event that weak passwords are used.&nbsp;Check out our&nbsp;<a href="https://www.malwarebytes.com/password-generator">password generator&nbsp;</a>tool to create a strong password that is hard to guess.</p><!-- /wp:paragraph --> <!-- wp:paragraph --><p>Password guessing shouldn&rsquo;t be confused with <a href="https://www.malwarebytes.com/glossary/password-cracking" rel="noopener noreferrer">password cracking</a>.</p><!-- /wp:paragraph --> <!-- wp:paragraph --><p>Synonym: PG-ing</p><!-- /wp:paragraph --> <!-- wp:paragraph --><p><strong>Learn more:&nbsp;</strong></p><!-- /wp:paragraph --> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/what-is-password-manager">What is a password manager?</a></p><!-- /wp:paragraph --> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/brute-force-attack">Brute force attack</a></p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Password manager</h3> <!-- wp:paragraph --><p>A&nbsp;<a href="https://www.malwarebytes.com/what-is-password-manager">password manager</a>&nbsp;is a software application designed to store and manage online credentials. It also generates passwords. Usually, these passwords are stored in an encrypted database and locked behind a master password. For more information, see&nbsp;<a href="https://blog.malwarebytes.com/101/2017/05/dont-need-27-different-passwords/" target="_blank" rel="noopener noreferrer">this blog post</a>&nbsp;for a longer brief on password managers, and what to do if you&#8217;re opposed to using one. If you&#8217;re not sure if you are using a strong password,&nbsp;check out our&nbsp;<a href="https://www.malwarebytes.com/password-generator">password generator&nbsp;</a>tool.&nbsp;</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Patch management software</h3> <!-- wp:paragraph --><p>A&nbsp;<a href="https://www.malwarebytes.com/cybersecurity/business/what-is-patch-management">patch management software</a>&nbsp;(or a patch manager) helps IT security teams detect errors (<a href="https://www.malwarebytes.com/glossary/vulnerabilities">vulnerabilities</a>) in software updates and applies a software patch as a fix to mitigate risk of intrusion.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Payload</h3> <!-- wp:paragraph --><p>In cybersecurity, a payload is malware that the <a href="https://www.malwarebytes.com/glossary/threat-actor" rel="noopener noreferrer">threat actor</a> intends to deliver to the victim. For example, if a cybercriminal sent out an email with a malicious Macro as the attachment and the victim gets infected with ransomware, then the ransomware is the payload (and not the email or document).</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Peer-to-peer (P2P)</h3> <!-- wp:paragraph --><p>Peer-to-peer, sometimes abbreviated as P2P, involves the sharing of files and/or resources between two computers connected to each other through a network. Each of these computers become a file server to the other.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Penetration testing</h3> <!-- wp:paragraph --><p>Penetration testing, or pen testing, is the practice of running controlled attacks on a computer system, network, software, or other application in an attempt to find unpatched vulnerabilities or flaws. By performing pen tests, an organization can find ways to harden their systems against possible future real attacks, and thus make them less exploitable.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Peopleware</h3> <!-- wp:paragraph --><p>Peopleware is the term used to refer to the role of humans/people in information technology, such as the creation of hardware and software.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Personal identification number (PIN)</h3> <!-- wp:paragraph --><p>A personal identification number (PIN) is a set of numeric or alphanumeric characters used for authentication. While typically used in ATMs and point-of-sale card transactions, PINs are also used by <a href="https://www.malwarebytes.com/glossary/operating-system-os">operating systems</a> like Windows and macOS.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Personally Identifiable Information (PII)</h3> <!-- wp:paragraph --> <p><a href="https://www.malwarebytes.com/cybersecurity/basics/pii">Personally Identifiable Information</a> (PII) is the term used for data that can be tracked back to one specific user. Examples of PII are names, social security numbers, biometrics, and other information that, in combination with other data, could be enough to identify a user. &#8220;Personally Identifiable Information&#8221; also has a legal definition, <a href="https://blog.malwarebytes.com/security-world/2019/04/what-is-personal-information-in-legal-terms-it-depends/" target="_blank" rel="noopener noreferrer">depending on the country and its laws</a>. Personally Identifiable Information in one state may not include the same type of information as &#8220;personal information&#8221; or &#8220;personal data&#8221; in another state, but the purpose of these laws is often the same—to protect the types of data that could reveal a person&#8217;s identity.</p> <!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Pharma</h3> <!-- wp:paragraph --><p>Pharma is short for &#8220;pharmacy.&#8221; In cybersecurity, the expression refers to spam or websites that traffic in fake or illegal medication. These sites may also sell legal medication, but in violation of local laws.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Phishing</h3> <!-- wp:paragraph --> <p>Phishing scams attempt to obtain your information by presenting themselves as legitimate websites, then asking for your password, credit card details, or other sensitive information. For an in-depth look at phishing, see <a href="https://www.malwarebytes.com/phishing" rel="noopener noreferrer">this page</a>.</p> <!-- /wp:paragraph --> <!-- wp:paragraph --> <p>Also: catfishing. </p> <!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Phishing attack</h3> <!-- wp:paragraph --> <p>A phishing attack involves a threat actor posing as a trusted person or organization in order to trick potential victims into taking an action such as sending money or divulging information. Phishing attacks are commonly carried out by email, SMS text messaging, and voice calls. Targeted types of phishing attacks include <a href="https://www.malwarebytes.com/cybersecurity/basics/spear-phishing">spear phishing</a> and whale phishing.</p> <!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Phishing kit</h3> <!-- wp:paragraph --><p>A phishing kit is a set of materials and tools that allows scammers with little technical ability to create a convincing <a href="https://www.malwarebytes.com/glossary/phishing">phish</a>. Someone in need of a large-scale attack also uses a kit to deploy a phishing campaign at short notice.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Phreaking</h3> <!-- wp:paragraph --><p>Phreaking is the act of hacking into telecommunication systems, primarily to obtain free phone calls.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Plaintext</h3> <!-- wp:paragraph --><p>Before, plaintext just refers to any text, text file, or document containing text with no special formatting. The definition of the word has expanded to include any data that can be viewed in its original, plain form as opposed to its encrypted form. Other form(s): plain text, plain-text</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Platform</h3> <!-- wp:paragraph --><p>A platform is most commonly the software used to operate a PC, such as an <a href="https://www.malwarebytes.com/glossary/operating-system-os">operating system</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Point-of-sale (PoS) malware</h3> <!-- wp:paragraph --><p>Point-of-sale (PoS) <a href="https://www.malwarebytes.com/glossary/malware">malware</a> usually targets payment terminals and card readers to compromise payment data and send it to criminals.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Polymorphism</h3> <!-- wp:paragraph --><p>In the context of <a href="https://www.malwarebytes.com/glossary/malware" rel="noopener noreferrer">malware</a> terminology, polymorphism is the ability of code to change its identifiable features while maintaining its functionality. Because of this ability, polymorphic malware like <a href="https://www.malwarebytes.com/emotet" rel="noopener noreferrer">Emotet</a> are difficult to detect.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Portable device</h3> <!-- wp:paragraph --><p>A portable device is a device that can easily be carried around, such as a laptop, notebook, tablet, or phone.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Portable Executable (PE) file header</h3> <!-- wp:paragraph --><p>The Portable Executable (PE) file header contains the <a href="https://www.malwarebytes.com/glossary/metadata" rel="noopener noreferrer">metadata</a> about the executable file itself. At its bare minimum, it comprises of the following: a DOS stub, a signature, the architecture of the file&#8217;s code, a time stamp, a pointer, and various flags.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Power User</h3> <!-- wp:paragraph --><p>A power user is typically someone performing specific tasks or functions to a higher level than others, often with specialised equipment or tools to get the tasks done.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>PowerShell</h3> <!-- wp:paragraph --><p>PowerShell is a configuration management framework that allows system administrators and power-users to perform administrative tasks via a command line.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Preinstalled software</h3> <!-- wp:paragraph --><p>Preinstalled software is software that typically comes pre-loaded on a new computer separate from the operating system. Most preinstalled software is not necessary for the proper functioning of the computer. In some cases, it may have the negative effect of impacting the computer&#8217;s performance by using memory, CPU, and hard drive resources.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Privilege escalation</h3> <!-- wp:paragraph --><p>An act or event that occurs when a <a href="https://www.malwarebytes.com/glossary/threat-actor" rel="noopener">threat actor</a> or unauthorized user achieves full access to normally restricted resources on a computing device&#8217;s <a href="https://www.malwarebytes.com/glossary/operating-system-os" rel="noopener">operating system (OS)</a> it has gained access to.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Professional Service Automation (PSA)</h3> <!-- wp:paragraph --><p>A PSA is software that allows companies to manage their resources efficiently. It is used from start to finish of a project&#8217;s lifecycle, which usually begins from assigning people up to billing the client once the project is done.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Proof of concept</h3> <!-- wp:paragraph --><p>A proof of concept (PoC) is a demonstration that a certain idea or method works. In computer security this often means that hackers show that they have been able to make use of a security flaw in software or hardware.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Protector</h3> <!-- wp:paragraph --><p>In malware research, a protector is software intended to prevent tampering and reverse engineering of programs. The methods used can&mdash;and usually will&mdash;include both packing and encrypting. This combination, plus added features, makes what is usually referred to as a protector. Researchers are then faced with protective layers around the payload, making reverse engineering difficult. A completely different approach, which also falls under the umbrella of protectors, is code virtualization, which uses a customized and different virtual instruction set every time you use it to protect your application. Of these protectors, there are professional versions that are used in the gaming industry against piracy. More information about this and related subjects can be found in our blog post, <a href="https://blog.malwarebytes.com/cybercrime/malware/2017/03/explained-packer-crypter-and-protector/" target="_blank" rel="noopener">Explained: Packer, Crypter, and Protector</a></p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Proxy</h3> <!-- wp:paragraph --><p>A proxy is something which sits between your computer and whatever you may be connecting to, shielding your true identity from it. These are mostly used for increased anonymity.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Proxy server</h3> <!-- wp:paragraph --><p>A proxy server is something that sits between your device and the servers you&#8217;re making requests to. A benefit of this is shielding some of your information, such as your <a href="https://www.malwarebytes.com/glossary/ip-address">IP address</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Pseudocode</h3> <!-- wp:paragraph --><p>Pronounced as <em>soo-doh-kohd</em>. It is a detailed human-readable yet detailed description of what a computer program or algorithm is supposed to do. Pseudocode is often used in developing a program. It also provides programmers a template to follow in writing their code. Related blog post(s):</p><!-- /wp:paragraph --> <!-- wp:list --><ul> <!-- wp:list-item --><li><a href="https://blog.malwarebytes.com/threat-analysis/2017/10/using-ilspy-to-analyze-a-small-adware-file/" rel="noopener" target="_blank">Using ILSpy to analyze a small adware file</a></li><!-- /wp:list-item --> </ul><!-- /wp:list --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>PUM</h3> <!-- wp:paragraph --><p>Stands for potentially unwanted modification. This is an alteration made to a computer&#8217;s registry (or other settings), which either damages the computer or changes its behaviour, without knowledge of the user. Such unwanted alterations can be done by legitimate software, malware, grayware, or PUP.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>Punycode</h3> <!-- wp:paragraph --><p>Is a method of encoding that converts <a href="https://www.malwarebytes.com/glossary/unicode" rel="noopener noreferrer">Unicode</a> to <a href="https://www.malwarebytes.com/glossary/american-standard-code-for-information-interchange" rel="noopener noreferrer">ASCII</a>. This is especially helpful when representing non-Latin or foreign characters that are used in Internet host names. Related blog post(s):</p><!-- /wp:paragraph --> <!-- wp:list --><ul> <!-- wp:list-item --><li><a href="https://blog.malwarebytes.com/101/2017/10/out-of-character-homograph-attacks-explained/" target="_blank" rel="noopener noreferrer">Out of character: Homograph attacks explained</a></li><!-- /wp:list-item --> </ul><!-- /wp:list --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-P"> <h3>PUP</h3> <!-- wp:paragraph --><p>PUPs, or Potentially Unwanted Programs, are programs that may include advertising, toolbars, and pop-ups that are unrelated to the software you downloaded. PUPs often come bundled with other software that you installed. Read more in depth&nbsp;<a href="https://www.malwarebytes.com/cybersecurity/basics/what-is-pup">what is PUP</a>&nbsp;in this linked article.&nbsp;</p><!-- /wp:paragraph --> </div> <h2>Q</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-Q"> <h3>QR Code</h3> <!-- wp:paragraph --><p>A QR code is a 2-dimensional barcode. They are squares filled with black and white blocks invented to keep track of cars during manufacturing.</p><!-- /wp:paragraph --> <!-- wp:paragraph --><p>A more in-depth guide about <a href="https://www.malwarebytes.com/cybersecurity/basics/what-is-a-qr-code">what is a QR code</a> and is it safe.&nbsp;</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-Q"> <h3>Quarantine</h3> <!-- wp:paragraph --><p>In computing terms, to quarantine is when a potentially malicious file is placed into a &#8220;safe&#8221; location by the onboard security software, so that it can do no harm while the user decides what to do with it.</p><!-- /wp:paragraph --> </div> <h2>R</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-R"> <h3>RAM scraping</h3> <!-- wp:paragraph --><p>RAM scraping, or memory scraping, is the act of scanning the memory of digital devices, such as point-of-sale (PoS) systems, to retrieve sensitive personal and banking information. <a href="https://www.malwarebytes.com/glossary/point-sale-pos-malware" rel="noopener noreferrer">PoS malware</a> can usually perform RAM scraping.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-R"> <h3>Random access memory (RAM)</h3> <!-- wp:paragraph --><p>A random access memory (RAM) is a computer hardware device where the <a href="https://www.malwarebytes.com/glossary/operating-system-os" rel="noopener noreferrer">OS</a>, installed software applications, and data the user currently uses is stored so it would be easier for the processor to retrieve them. It is the main memory of a computer.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-R"> <h3>Ransomware</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/ransomware">Ransomware</a> is a form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom to get them back.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-R"> <h3>Ransomware-as-a-service</h3> <!-- wp:paragraph --><p>Is abbreviated as RaaS. This is a form of software-as-a-service (SaaS) catered by underground vendors to <a href="https://www.malwarebytes.com/glossary/threat-actor" rel="noopener noreferrer">threat actors</a> by providing them a <a href="https://www.malwarebytes.com/glossary/ransomware" rel="noopener noreferrer">ransomware</a> platform tool. See: <a href="https://www.malwarebytes.com/glossary/xaas" rel="noopener noreferrer">Anything-as-a-Service</a></p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-R"> <h3>RAR</h3> <!-- wp:paragraph --><p>RAR files, like other archives, are essentially data containers where one or more files are stored in compressed form. <a href="https://www.rarlab.com" rel="noopener" target="_blank">WinRAR</a> is the software typically used to compress these files. RAR files use the <em>.rar</em> extension.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-R"> <h3>Recon</h3> <!-- wp:paragraph --><p>Is short for <em>reconnaissance</em>, which (in the context of information security) describes an act of a <a href="https://www.malwarebytes.com/glossary/threat-actor" rel="noopener">threat actor</a> using remote access tools (RAT) to gain access to a target system to assess items of value and map the network landscape.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-R"> <h3>Remediation</h3> <!-- wp:paragraph --><p>In computing, this is the process or method of correcting system changes, regardless of severity, on the affected system. <a href="https://www.malwarebytes.com/glossary/mitigation" rel="noopener">Mitigation</a> usually precedes remediation.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-R"> <h3>Remote access</h3> <!-- wp:paragraph --><p>Is controlling a computer system from another location. There are many programs that enable this method of working. Unfortunately, it is also a tool of choice for <a href="https://blog.malwarebytes.com/tech-support-scams/" target="_blank" rel="noopener">Tech Support Scammers</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-R"> <h3>Remote administration tool (RAT)</h3> <!-- wp:paragraph --><p>A software program that allows users to control another system as if they have physical access to it.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-R"> <h3>Remote code execution (RCE) attack</h3> <!-- wp:paragraph --><p>A remote code execution (RCE) attack happens when a <a href="https://www.malwarebytes.com/glossary/threat-actor" rel="noopener noreferrer">threat actor</a> illegally accesses and manipulates a computer or server without authorization from its owner. A system can be taken over using <a href="https://www.malwarebytes.com/glossary/malware" rel="noopener noreferrer">malware</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-R"> <h3>Remote desktop protocol (RDP)</h3> <!-- wp:paragraph --><p>Remote desktop protocol (RDP) is a network communications protocol that allows remote management of assets. Network administrators normally use RDP to diagnose problems on the endpoint.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-R"> <h3>Remote monitoring and management (RMM)</h3> <!-- wp:paragraph --><p>Remote monitoring and management (RMM) refers to the process of managing and controlling systems within a networking remotely via a specialized software, which is often referred to as RMM software. <a href="https://www.malwarebytes.com/glossary/managed-service-provider-msp" rel="noopener noreferrer">MSPs</a> usually perform RMM for their clients.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-R"> <h3>Remote user</h3> <!-- wp:paragraph --><p>Is someone who operates or accesses a computing device from an off-site location.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-R"> <h3>Retrovirus</h3> <!-- wp:paragraph --><p>A retrovirus is also referred to as an <em>anti-</em>anti-virus virus. This means that it tries to attack and disable any anti-virus or protective software on the system it is trying to infect to avoid detection.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-R"> <h3>Revenge porn</h3> <!-- wp:paragraph --><p>Revenge porn is the distribution of sexually explicit material, such as images and videos, of someone without their consent whether they know such material existed or not. Usually, revenge porn is initiated by former intimate partners of the subject to humiliate them. Other form(s): revenge pornograpy Synonym: image-based sexual abuse</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-R"> <h3>Riskware</h3> <!-- wp:paragraph --><p>Riskware, or &#8220;risky software,&#8221; describes legitimate software programs that contain loopholes or vulnerabilities that can be exploited by hackers for malicious purposes.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-R"> <h3>Robocall</h3> <!-- wp:paragraph --><p>A robocall is an automated phone call that delivers a recorded message. Normally, political parties, schools, and telemarketing companies use robocall. But scammers are known to abuse robocalls. For more information, see <a href="https://blog.malwarebytes.com/101/2018/02/stop-telephoning-me-robocalls-explained/" target="_blank" rel="noopener noreferrer">this blog post</a> for a deep dive on robocalling.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-R"> <h3>Rootkit</h3> <!-- wp:paragraph --><p>Is software, generally classified as malware, that provides the attacker with administrator privileges on the infected system and actively hides. They also hide from other software on the system, often even from the <a href="https://www.malwarebytes.com/glossary/operating-system-os" rel="noopener">operating system</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-R"> <h3>RunPE Technique</h3> <!-- wp:paragraph --><p>A common technique malware uses: running the original executable, suspending it, unmapping from the memory, mapping the payload on its place, and running it again.</p><!-- /wp:paragraph --> </div> <h2>S</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Safe Mode</h3> <!-- wp:paragraph --><p>It&#8217;s a boot option that loads only the most basic drivers needed for Windows to run. There are different sets of drivers that can be loaded, depending on the kind of &#8220;Safe Mode&#8221; the user selects. For more information, see the article <a href="https://blog.malwarebytes.com/101/2015/01/safe-mode/" target="_blank" rel="noopener">safe mode</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Sandbox solution</h3> <!-- wp:paragraph --><p>A type of solution wherein IT administers run a program in a controlled environment to determine whether it is safe to deploy within their network or not.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Scam</h3> <!-- wp:paragraph --><p>In cybersecurity, scams are attempts to obtain money or something else of value through dishonest means, mostly over the Internet, though sometimes with a phone call.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Screen scraper</h3> <!-- wp:paragraph --><p>A screen scraper is a form of malware capable of taking screenshots or gathering data from the visible desktop to send them back to its controller.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Screenlocker</h3> <!-- wp:paragraph --><p>A screenlocker can either be a legitimate program that locks a PC while users are away from the desk, or a piece of malware, which could be anything from a &#8220;prank&#8221; software to ransomware. The latter locks a desktop while encrypting files to blackmail a victim into paying a ransom.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Script kiddie</h3> <!-- wp:paragraph --><p>A script kiddie is a derogatory term given to hackers who may feel have no technical ability. Some wear the name as a badge of pride.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Search neutrality</h3> <!-- wp:paragraph --><p>Search neutrality is a concept asserting that the rules for <a href="https://www.malwarebytes.com/glossary/net-neutrality" rel="noopener noreferrer">net neutrality</a> should be applied to search engines.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Secure Sockets Layer (SSL)</h3> <!-- wp:paragraph --><p>A Secure Sockets Layer (SSL) is an <a href="https://www.malwarebytes.com/glossary/encryption" rel="noopener noreferrer">encryption</a> protocol that secures connections between clients and servers over the internet. This protocol has been deprecated in 2015 and replaced by the <a href="https://www.malwarebytes.com/glossary/transport-layer-security-tls" rel="noopener noreferrer">Transport Layer Security (TLS)</a> protocol. Read more about what an SSL certificate is, how SSL works and different types of SSL: <a href="https://www.malwarebytes.com/cybersecurity/basics/what-is-ssl-certificate">What is an SSL certificate</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Security information and event management (SIEM)</h3> <!-- wp:paragraph --><p>In computer security, security information and event management (SIEM) refers to software or a service that gives organizations the big picture of its information security. It is a hybrid of security information management (SIM) and security event management (SEM), allowing one to identify, analyze, alert, and take appropriate action on flagged issues.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Seed</h3> <!-- wp:paragraph --><p>In computer security related terminology a seed is one of the factors used to create (a series of) <a href="https://blog.malwarebytes.com/cybercrime/2013/09/in-computers-are-random-numbers-really-random/" target="_blank" rel="noopener">seemingly random</a> numbers or strings.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>SEO</h3> <!-- wp:paragraph --><p>Is short for <em>search engine optimization</em>. This is a set of marketing techniques aimed at raising the popularity of a website. The goal is to have your site high up in the search results when a user searches for certain relevant keywords.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Server</h3> <!-- wp:paragraph --><p>A server is a computer or computer program that manages access to a centralized resource or service in a network.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Server Message Block (SMB)</h3> <!-- wp:paragraph --><p>In the context of computer networking, a Server Message Block (SMB) is an internet standard communications protocol used for sharing folders, printers, serial ports, and other resources between a server and its client within a network.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Service-level agreement (SLA)</h3> <!-- wp:paragraph --><p>An SLA is an agreement between a service provider and its clients. This is usually legally binding.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Sextortion</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/blog/news/2021/01/new-sextortion-scam-in-time-for-the-new-year">Sextortion</a> is a form of extortion that leverages real, or fabricated explicit material of the victim. Sometimes the images don&#8217;t exist at all but the threat-actor threatens to put them online or send them to the victim&#8217;s contacts.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Shareware</h3> <!-- wp:paragraph --><p>Shareware is software that is used and distributed for free, which may or may not have limited features, up to a certain period of time. Once that period is exceeded, users may be required to pay for its continued use.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Shimming</h3> <!-- wp:paragraph --><p>Shimming is hailed as an upgraded version of <a href="https://www.malwarebytes.com/glossary/skimming" rel="noopener noreferrer">skimming</a>. Instead of stealing information from your debit or credit card&#8217;s magnetic strip, it steals from their EMV chip. For more information, see <a href="https://blog.malwarebytes.com/101/2019/05/everything-you-need-to-know-about-atm-attacks-and-fraud-part-1/" target="_blank" rel="noopener noreferrer">this blog post</a> on the various types of ATM fraud and scams.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>SIEM</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/cybersecurity/business/what-is-siem">SIEM</a> stands for Security Information and Event Management. SIEM systems are designed to provide <a href="https://www.malwarebytes.com/glossary/soc" rel="noopener">SOC</a>s or other security managers with information about the entire system&#8217;s infrastructure to support detection and help with incident response and prevention.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Signature</h3> <!-- wp:paragraph --><p>In computer security, a signature is a specific pattern that allows cybersecurity technologies to recognize malicious threats, such as a byte sequence in network traffic or known malicious instruction sequences used by families of malware. Signature-based detection, then, is a methodology used by many cybersecurity companies to detect malware that has already been discovered in the wild and cataloged as part of a database.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>SIMjacking</h3> <!-- wp:paragraph --><p>SIMjacking is the method of assuming control of a target&#8217;s mobile number. Fraudsters do this in a number of ways. One way is porting the target&#8217;s phone number from one mobile service provider to another. Other forms: SIM jacking, SIM-jacking Synonyms: SIM splitting, SIM swapping, SIM swap scam, port-out scam</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Skimming</h3> <!-- wp:paragraph --><p>Skimming is a type of fraud targeting automated teller machine (ATM) and point-of-sale (POS) terminals wherein a device (called a skimmer) or malware is used to steal information from your credit or debit card&#8217;s magnetic strip. For more information, see <a href="https://blog.malwarebytes.com/101/2014/08/atm-skimming-a-refresher/" target="_blank" rel="noopener noreferrer">this blog post</a> on ATM skimming.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Smart home</h3> <!-- wp:paragraph --><p>Also called smart house or building. This is an establishment that incorporates advanced automated systems that enable users to remotely control an array of electronic devices. For example, a user living in a smart home is capable of controlling appliances, room temperature, lighting, and the security system by issuing commands to a computing device.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>SMS phishing (Smishing)</h3> <!-- wp:paragraph --> <p>Smishing, short for SMS phishing, is a type of <a href="https://www.malwarebytes.com/phishing">phishing</a> on mobile devices. It is carried out via SMS text messaging. For more information, see <a href="https://blog.malwarebytes.com/101/2017/06/somethings-phishy-how-to-detect-phishing-attempts/" target="_blank" rel="noopener">this blog post</a> on how to generally detect phishing attempts.</p> <!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>SOAR Security Orchestration, Automation, and Response</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/cybersecurity/business/what-is-soar">SOAR (Security Orchestration, Automation, and Response)</a>&nbsp;alleviates the burden on talent-constrained security teams by automating areas such as vulnerability management, incident response, and security operations management on a single platform. SOAR&nbsp;is a system that enables enterprises to streamline security operations responsibilities.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>SOC</h3> <!-- wp:paragraph --><p>Stands for <a href="https://www.malwarebytes.com/cybersecurity/business/what-is-soc-as-a-service">Security Operations Center</a> and is a centralized unit of personnel, processes and technology that guard the security and investigate security breaches for a bigger entity, usually a company or a network. A SOC does not necessarily have to be part of an organization, they can be hired externally.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Social engineering</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/social-engineering">Social engineering</a> is the description of methods that attackers use to get the victims to breach security protocol or give up private information. There are many tactics that lead to this goal, and they rely on psychological manipulation, such as seducing the victims by playing to their greed, vanity, or their willingness to help someone.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Software delivery layer</h3> <!-- wp:paragraph --><p>Refers to a method for network administrators to push out and manage software on the systems they are responsible for.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Software vulnerability</h3> <!-- wp:paragraph --><p>Refers to a weakness or flaw in software, which leaves it open to be exploited by <a href="https://www.malwarebytes.com/glossary/threat-actor" rel="noopener">threat actors</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Spam</h3> <!-- wp:paragraph --> <p>Spam is an undesired communication, often an email or call, that gets sent out in bulk. Spam wastes time and resources, so many communication tools have built-in ways of minimizing it. For an in-depth look at spam, see <a href="https://www.malwarebytes.com/spam" rel="noopener noreferrer">this page</a>.</p> <!-- /wp:paragraph --> <!-- wp:paragraph --> <p>Also: <a href="https://www.malwarebytes.com/cybersecurity/basics/robocalls-how-to-stop">robocalls</a></p> <!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Spambot</h3> <!-- wp:paragraph --><p>A program designed to build mailing lists to send unsolicited emails to by harvesting email addresses from websites, newsgroups, and even chat room conversations.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Spear phishing</h3> <!-- wp:paragraph --> <p><a href="https://www.malwarebytes.com/cybersecurity/basics/spear-phishing">Spear phishing</a> is a method of deceiving users via online messages, usually email, into giving up important data. Such attacks are targeted at a particular user or group of users (e.g. employees of one company). The intended victim(s) will be asked to fill out forms or lured into installing data-gathering <a href="https://www.malwarebytes.com/glossary/malware" rel="noopener noreferrer">malware</a> on their system.</p> <!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Spyware</h3> <!-- wp:paragraph --><p>Spyware is a type of malware that gathers information on a device and sends it to a third-party actor or organization that wouldn&#8217;t normally have access. In the past, this term was also used for adware and cookies. For an in-depth look at spyware, see <a href="https://www.malwarebytes.com/spyware" rel="noopener noreferrer">this page</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>SQL injection</h3> <!-- wp:paragraph --><p>An SQL injection is a type of <a href="https://www.malwarebytes.com/glossary/injection-attacks" rel="noopener noreferrer">injection attack</a> wherein a threat actor introduces a malicious SQL code into a database as a way to circumvent web application security measures to reveal sensitive information, destroy it, or tamper with it. This is usually done on vulnerable sites that accept user entries, such as a search box. For an in-depth look at SQL injection, see <a href="https://www.malwarebytes.com/sql-injection" rel="noopener noreferrer">this page</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>SSL certificate</h3> <!-- wp:paragraph --><p>An SSL certificate is installed to a web server, providing the means to make payments and send communications securely without fear of eavesdropping.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Stalkerware</h3> <!-- wp:paragraph --><p>Stalkerware is a general term used to describe software applications that are specifically designed to track individuals while hiding from view. Many stalkerware applications market themselves as parental monitoring tools, but they can be and often are used to stalk and spy on a person. The most common users of stalkerware are domestic violence abusers, who load these programs onto their partner&#8217;s computer or mobile device without their knowledge. Synonyms: <a href="https://www.malwarebytes.com/glossary/spyware" rel="noopener noreferrer">spyware</a>, commercial surveillance software, commercial spyware, spouseware</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Steganography</h3> <!-- wp:paragraph --><p>Is the science of hiding information. In cyber-security this usually comes down to hiding the malicious information behind seemingly harmless messages. Consider for example <a href="https://www.malwarebytes.com/glossary/malvertising">malvertising</a> where the code is hidden in images. Or <a href="https://www.malwarebytes.com/glossary/malware">malware</a> where the <a href="https://www.malwarebytes.com/glossary/threat-actor">threat actors</a> used Twitter as their <a href="https://www.malwarebytes.com/glossary/cc">C&amp;C</a> infrastructure.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Stream</h3> <!-- wp:paragraph --><p>In computing, a stream is could mean a flow of data in one or both directions. It could also mean a sequence of data elements.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Stream cipher</h3> <!-- wp:paragraph --><p>A stream cipher is one of the two methods of encrypting data. With this method, each plaintext character is encrypted one at a time with a corresponding character of the keystream. Also see <a href="https://www.malwarebytes.com/glossary/block-cipher">block cipher</a>. &nbsp;</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Supply-chain attack</h3> <!-- wp:paragraph --><p>A type of attack that targets the weakest or most vulnerable element in a business&#8217;s or organization&#8217;s supply chain network. There are several ways this can be done: one, cybercriminals can continuously attack the system through hacking; another is by embedding malware into a manufacturer&#8217;s software. However this is done, the purpose of a supply chain attack is to gain access to sensitive data repositories and damage the company. Related blog post(s):</p><!-- /wp:paragraph --> <!-- wp:list --><ul> <!-- wp:list-item --><li><a href="https://blog.malwarebytes.com/threat-analysis/2013/11/stuxnet-new-light-through-old-windows/" rel="noopener" target="_blank">Stuxnet: new light through old windows</a></li><!-- /wp:list-item --> <!-- wp:list-item --><li><a href="https://blog.malwarebytes.com/cybercrime/2014/01/revealed-pos-malware-used-in-target-attack/" rel="noopener" target="_blank">Revealed: POS malware used in Target attack</a></li><!-- /wp:list-item --> <!-- wp:list-item --><li><a href="https://blog.malwarebytes.com/cybercrime/2017/06/petya-esque-ransomware-is-spreading-across-the-world/" target="_blank" rel="noopener">Petya-esque ransomware is spreading across the world</a></li><!-- /wp:list-item --> <!-- wp:list-item --><li><a href="https://blog.malwarebytes.com/security-world/2017/09/infected-ccleaner-downloads-from-official-servers/" target="_blank" rel="noopener">Infected CCleaner downloads from official servers</a></li><!-- /wp:list-item --> </ul><!-- /wp:list --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Suspicious activity</h3> <!-- wp:paragraph {"className":"p1"} --><p class="p1"><span class="s1">In our Malwarebytes product, &#8220;possible suspicious activity&#8221; encompasses a variety of behaviors that are commonly</span> <span class="s1">attributed to <a href="https://blog.malwarebytes.com/tech-support-scams/" target="_blank" rel="noopener noreferrer">technical support scams</a>,</span> <span class="s1"><a href="https://www.malwarebytes.com/glossary/cryptojacking" rel="noopener noreferrer">cryptojacking</a>, <a href="https://www.malwarebytes.com/glossary/hijack" rel="noopener noreferrer">browser hijacking</a>, and other</span> <span class="s1">types of harmful or <a href="https://www.malwarebytes.com/glossary/pup" rel="noopener noreferrer">potentially</a></span> <span class="s1">unwanted programs (PUPs).</span></p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>Symbian malware</h3> <!-- wp:paragraph --><p>Symbian malware targets mobile devices running Symbian, a smartphone <a href="https://www.malwarebytes.com/glossary/operating-system-os" rel="noopener noreferrer">OS</a> that is discontinued. Some of the well-known malware affected this mobile OS are Cabir (a <a href="https://www.malwarebytes.com/glossary/worm" rel="noopener noreferrer">worm</a>), Drever, and Locknut (both <a href="https://www.malwarebytes.com/glossary/trojan" rel="noopener noreferrer">Trojans</a>).</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>System on a Chip (SoC)</h3> <!-- wp:paragraph --><p>A system on a chip (SoC) is a piece of technology built to integrate all components of a computer or electronic device. It&#8217;s essentially a functional computer miniaturized to the size of a silicon chip. SoCs are commonly used in small electronic devices, such as a smartphone, tablet, smart watch, and others. Other forms: System on chip</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-S"> <h3>System optimizer</h3> <!-- wp:paragraph --><p>This type of software combines some or all of the below functionalities:</p><!-- /wp:paragraph --> <!-- wp:list --><ul> <!-- wp:list-item --><li>Registry cleaner</li><!-- /wp:list-item --> <!-- wp:list-item --><li>Driver Updater</li><!-- /wp:list-item --> <!-- wp:list-item --><li>Temp file cleaner</li><!-- /wp:list-item --> <!-- wp:list-item --><li>Disk optimizer (disk defragmenter)</li><!-- /wp:list-item --> <!-- wp:list-item --><li>Report system errors</li><!-- /wp:list-item --> </ul><!-- /wp:list --> <!-- wp:paragraph --><p>Since all these functionalities are offered by free tools built into the Windows operating system, many system optimizers are considered <a href="https://www.malwarebytes.com/glossary/pup">Potentially Unwanted Programs (PUPs)</a>, especially if they exaggerate the seriousness of possible improvements that can be made on user system.</p><!-- /wp:paragraph --> </div> <h2>T</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-T"> <h3>Targeted attack</h3> <!-- wp:paragraph --><p>Refers to an attack aimed at a certain person or group of people. The attackers can be an organization or people that work in a certain field.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-T"> <h3>The United States Computer Emergency Readiness Team (US-CERT)</h3> <!-- wp:paragraph --><p>The US Computer Emergency Readiness Team (US-CERT) is a branch of the Office of Cybersecurity and Communications&#8217; (CS&amp;C) National Cybersecurity and Communications Integration Center (NCCIC). It was created to protect the country&#8217;s internet infrastructure, improve the US&#8217;s cybersecurity posture, coordinate information sharing, and reduce the risk of cyber threats proactively. US-CERT also educates consumers and businesses about data security, and assist security organizations in terms of threat detection and management among others.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-T"> <h3>Third party</h3> <!-- wp:paragraph --><p>Is a term used to describe an entity that is involved in a deal, but not directly as one of the entities that close the deal. In privacy policies, the term is often used to avoid being blamed, as the publisher, for something any third party might do to the user. For example, additional software that is included in a <a href="https://www.malwarebytes.com/glossary/bundler" rel="noopener noreferrer">bundler</a>, will usually be referred to as &#8220;third-party software&#8221;.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-T"> <h3>Third party patch management</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/blog/business/2022/10/third-party-application-patching-everything-you-need-to-know-for-your-business">Third party application patch management (or 3rd party patch management)</a> is the process&nbsp;of&nbsp;applying patch updates to third-party programs installed on your company&#8217;s endpoints (desktops, laptops, servers, and other devices). Third-party patch management fixes vulnerabilities that, if exploited, can compromise software security and functionality. Learn more about <a href="https://www.malwarebytes.com/glossary/patch-management-software">patch management</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-T"> <h3>Threat actor</h3> <!-- wp:paragraph --><p>In cybersecurity, a threat actor is a group or person behind a malicious incident. As it is sometimes unclear whether an attack was done by one person or whether there is a group or organization involved, we use this as a general term to describe the responsible entity.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-T"> <h3>Threat Detection and Response</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/cybersecurity/business/what-is-threat-detection">Threat detection and response</a>&nbsp;focuses on monitoring suspiscious cyber activity and providing contextual alerts. These alerts help to quicken the investigation process&nbsp;in an effort to prioritize and eliminate threats before vulnerabilities are exploited, the pinnacle of cybersecurity maturity.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-T"> <h3>Threat hunting</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/cybersecurity/business/what-is-cyber-threat-hunting">Threat hunting</a> in cyber security is a proactive method involving threat hunters who&nbsp;sleuth networks, endpoint devices, and systems for malicious activity and suspicious threat anomalies. Cyber threat hunting can help stop and prevent cyberattacks from causing irreversible damage to organizations.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-T"> <h3>Threat intelligence</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/cybersecurity/business/what-is-cyber-threat-intelligence">Threat intelligence</a>&nbsp;is data that has been collected, processed, and analyzed to understand threat actor behavior and stop intrusions.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-T"> <h3>Threat modeling</h3> <!-- wp:paragraph --><p><a href="https://www.malwarebytes.com/blog/business/2022/11/threat-modeling-vs.-vulnerability-assessment--what-is-the-difference">Threat modeling</a> is the process of identifying vulnerabilities and potential security threats, weighing their seriousness, and then prioritizing which weaknesses to address or mitigate.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-T"> <h3>TLD</h3> <!-- wp:paragraph --><p>Is short for Top Level Domain. This is the right hand part of a domain name. Examples are .com, .gov, and . info. In the hierarchical structure of the <a href="https://www.malwarebytes.com/glossary/domain-name-system">DNS</a> system these are at the highest level, hence the name. A complete <a href="http://data.iana.org/TLD/tlds-alpha-by-domain.txt" target="_blank" rel="noopener">list of valid TLDs </a>can be found at the ICANN.org site.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-T"> <h3>Token</h3> <!-- wp:paragraph --><p>In information security, a token is a small hardware device that, together with what a user knows&mdash;such as a PIN&mdash;gives him/her authorized access to a computing system or network. A smart card and a key fob are examples of security tokens.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-T"> <h3>Tor</h3> <!-- wp:paragraph --><p>Tor is the acronym for the software project called &#8220;The Onion Router&#8221;. This is created to promote privacy and anonymity online by stopping people learning and collecting user data on their locations and browsing habits.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-T"> <h3>Torrent</h3> <!-- wp:paragraph --><p>A torrent refers to a torrent descriptor file used by BitTorrent clients when sending and receiving files, which are usually large, over the internet. It uses the <em>.torrent</em> extension.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-T"> <h3>Trackware</h3> <!-- wp:paragraph --><p>Trackware is a type of program used to gather system information and/or user activity from computing devices, and then send the information to third-party entity.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-T"> <h3>Transport Layer Security (TLS)</h3> <!-- wp:paragraph --><p>Transport Layer Security (TLS) is an <a href="https://www.malwarebytes.com/glossary/encryption" rel="noopener noreferrer">encryption</a> protocol that authenticates the communication of two computing applications. It also ensures that the channel is private and the data exchanged is uncorrupted and can only be viewed by authorized parties. TLS is the successor of <a href="https://www.malwarebytes.com/glossary/secure-sockets-layer-ssl" rel="noopener noreferrer">Secure Sockets Layer (SSL)</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-T"> <h3>Trojan</h3> <!-- wp:paragraph --><p>Trojans are programs that claim to perform one function but actually do another, typically malicious. Trojans can take the form of attachments, downloads, and fake videos/programs and, once active on a system, may do a number of things, including stealing sensitive data or taking control of the device. For an in-depth look at Trojans, see <a href="https://www.malwarebytes.com/trojan" rel="noopener noreferrer">this page</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-T"> <h3>Trolling</h3> <!-- wp:paragraph --><p>Trolling is the act of deliberately causing quarrels, annoyance, disagreements, and flame wars by posting controversial, insulting, derogatory, and even off-topic comments online. For more information, see <a href="https://blog.malwarebytes.com/cybercrime/2015/06/when-trolls-come-in-a-three-piece-suit/" target="_blank" rel="noopener noreferrer">this blog post</a> on trolling-as-a-service.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-T"> <h3>Troubleshooting</h3> <!-- wp:paragraph --><p>Is a systematical approach to finding the cause of a malfunction or other problem. With computers this usually starts with studying logs, some of which may have been created specifically for the problem at hand, others may be error logs or even <a href="https://www.malwarebytes.com/glossary/memory-dump">memory dumps</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-T"> <h3>Typosquatting</h3> <!-- wp:paragraph --><p>Typosquatting is the practice of deliberately registering a domain name which is similar to an existing popular name, in the hope of getting traffic by people who mis-type the URL of the popular domain. For more information, see the article <a href="https://blog.malwarebytes.com/cybercrime/2016/06/explained-typosquatting/" target="_blank" rel="noopener">typosquatting</a>.</p><!-- /wp:paragraph --> </div> <h2>U</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-U"> <h3>Ubiquitous computing (ubicomp)</h3> <!-- wp:paragraph --><p>Ubiquitous computing (ubicomp) is the technological trend of adding computational capability into everyday electronic devices by embedding a microprocessor. This allow them to communicate effectively and perform tasks that lessens the user&#8217;s need to interact with computers as computers. Examples of ubiquitous computing are laptops, tablets, smartphones, and wearable devices. Synonym(s): pervasive computing, everyware, ambient intelligence</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-U"> <h3>Ubuntu</h3> <!-- wp:paragraph --><p>Pronounced as <em>oo-boon-too</em>. It is a <a href="https://www.malwarebytes.com/glossary/linux" rel="noopener">Linux</a> distro that is based on the Debian architecture. It was designed for use on personal computers; however, it can be used on network servers as well. In fact, it is the most used OS in hosted environments, i.e., the <a href="https://www.malwarebytes.com/glossary/cloud-computing" rel="noopener">cloud</a>, and it&#8217;s also arguably the most famous distro.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-U"> <h3>Unicode</h3> <!-- wp:paragraph --><p>Unicode is a global standard for character encoding. It provides a unique number to every character in existence, which comprises of scripts and symbols. As such, it simplifies the localization of software and supports multilingual text processing. The Unicode Consortium maintains, develops, and promotes the use of the Unicode standard. External link(s):</p><!-- /wp:paragraph --> <!-- wp:list --><ul> <!-- wp:list-item --><li><a href="https://www.unicode.org/standard/standard.html" target="_blank" rel="noopener noreferrer">The Unicode Standard</a></li><!-- /wp:list-item --> </ul><!-- /wp:list --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-U"> <h3>Unicode Transformation Format (UTF)</h3> <!-- wp:paragraph --><p>A Unicode Transformation Format (UTF) is also known as the Universal Transformation Format. UTF is one of the two encodings used in Unicode. It maps the Unicode code ranges into sequences of code units.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-U"> <h3>Universal Authentication</h3> <!-- wp:paragraph --><p>Universal authentication is the method or process of allowing a user access to secure sites without having to verify his/her identity more than once. This may involve the use of software or a dedicated device. As of this writing, there is no standard for universal authentication. Synonym: Single sign-on (SSO)</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-U"> <h3>Universal serial bus (USB)</h3> <!-- wp:paragraph --><p>The USB is an industry standard establishing a common way for connections between devices and peripherals.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-U"> <h3>UNIX</h3> <!-- wp:paragraph --><p>UNIX is a modular <a href="https://www.malwarebytes.com/glossary/operating-system-os">operating system</a> developed in the 1970s, leading to widespread academic and commercial use over time.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-U"> <h3>Urban legend</h3> <!-- wp:paragraph --><p>In computing, urban legends are typically viral scare stories warning of a particular hacker&#8217;s skill, or how something bad will happen on a social network by a precise date unless people perform some tasks.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-U"> <h3>URL</h3> <!-- wp:paragraph --><p>Stands for Uniform Resource Locator and is a method to find resources located on the World Wide Web. A URL consists of (at least) a protocol (i.e. HTTP) and either a domain or an <a href="https://www.malwarebytes.com/glossary/ip-address">IP address</a>. They can also include a path on the server to point to a particular file or site.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-U"> <h3>USB attack</h3> <!-- wp:paragraph --><p>Refers to an attack where <a href="https://www.malwarebytes.com/glossary/threat-actor">threat actors</a> use a <a href="https://www.malwarebytes.com/glossary/universal-serial-bus-usb">USB</a> drive to spread malware. In a targeted attack, infected USB drives are deliberately dropped in public locations, such as parking lots, to entice victims to picking it up and opening it using their computers.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-U"> <h3>USB boot</h3> <!-- wp:paragraph --><p>A USB boot is booting up a computer using an <a href="https://www.malwarebytes.com/glossary/operating-system-os" rel="noopener">OS</a> or recovery program located on a USB stick as opposed to the computer&#8217;s hard drive.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-U"> <h3>Usenet</h3> <!-- wp:paragraph --><p>Usenet is a method of online communication first established in 1980, superficially resembling modern day internet forums.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-U"> <h3>User interface</h3> <!-- wp:paragraph --><p>In information technology, a UI is the visual part of an operating system or software that allows users to interact with a computing system, an application, or a website via input devices. There are three (3) known types of UI: command language, menu, and <a href="https://www.malwarebytes.com/glossary/graphical-user-interface" rel="noopener noreferrer">graphical user interface (GUI)</a>.</p><!-- /wp:paragraph --> </div> <h2>V</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-V"> <h3>Vaporware</h3> <!-- wp:paragraph --><p>In computer slang, it is a non-existent hardware or software that is publicly announced and actively promoted. A vaporware announcement may be a marketing strategy to gauge user interests in a particular product.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-V"> <h3>Variant</h3> <!-- wp:paragraph --><p>Often refers to closely related <a href="https://www.malwarebytes.com/glossary/malware">malware</a> strains or types of malware that are in the same family. Usually, it is a version of an existing malware family with modifications.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-V"> <h3>Virtual machine</h3> <!-- wp:paragraph --><p>A software computer or application environment that runs on another computer or <a href="https://www.malwarebytes.com/glossary/operating-system-os">OS</a>. User experience with virtual machines is the same as they would have on dedicated hardware.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-V"> <h3>Virtual memory</h3> <!-- wp:paragraph --><p>Is a memory management technique in use by the Windows <a href="https://www.malwarebytes.com/glossary/operating-system-os">operating system</a> to enlarge the address space. It uses a part of the hard drive to store pages and copy them into the <a href="https://www.malwarebytes.com/glossary/random-access-memory-ram">RAM</a>&nbsp;memory when they are needed. This method is slower then using RAM only, but it enables the user to run programs even if his RAM memory is already all in use.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-V"> <h3>Virtual private network (VPN)</h3> <!-- wp:paragraph --><p>A <a href="https://www.malwarebytes.com/what-is-vpn">virtual private network</a> is a virtual extension of a private network over the internet. It is often used to allow employees that are not in the physical office to connect to resources on the <a href="https://www.malwarebytes.com/glossary/intranet" rel="noopener noreferrer">intranet</a> as if they were in the office. But there are also commercial VPNs that can be used to anonymize your internet traffic. You can find more information about those in our blog post, <a href="https://blog.malwarebytes.com/security-world/2014/06/one-vpn-to-rule-them-all/" target="_blank" rel="noopener noreferrer">One VPN To Rule Them All!</a></p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-V"> <h3>Virtual reality (VR)</h3> <!-- wp:paragraph --><p>VR is a computer-generated simulation of an environment, using images, sounds, and sometimes other sensations to give users the illusion that they are in that environment and can interact with the objects in that environment.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-V"> <h3>Virus</h3> <!-- wp:paragraph --><p>A virus is <a href="https://www.malwarebytes.com/glossary/malware">malware</a> attached to another program (such as a document) which can replicate and spread after an initial execution on a target system where human interaction is required. Many viruses are harmful and can destroy data, slow down system resources, and log keystrokes.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-V"> <h3>Virus hoax</h3> <!-- wp:paragraph --><p>A false message warning users of having a computer virus. It comes in many forms, some are emails and some are pop-up windows.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-V"> <h3>Vishing</h3> <!-- wp:paragraph --> <p>Short for <em>voice phishing</em>. It is a <a href="https://www.malwarebytes.com/phishing">phishing</a> tactic that uses voice, either via VoIP or phone, to steal information from call recipients. See also:</p> <!-- /wp:paragraph --> <!-- wp:list --> <ul><!-- wp:list-item --> <li><a href="https://blog.malwarebytes.com/101/2017/06/somethings-phishy-how-to-detect-phishing-attempts/" target="_blank" rel="noopener">Something&#8217;s phishy: How to detect phishing attempts</a></li> <!-- /wp:list-item --></ul> <!-- /wp:list --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-V"> <h3>Visual spoofing</h3> <!-- wp:paragraph --><p>Is a type of threat vector where the similarities of characters and letters from different languages are used (deliberately or accidentally) to confuse and/or trick users. According to Chris Weber, a cybersecurity expert, there are <a href="https://websec.github.io/unicode-security-guide/visual-spoofing/" target="_blank" rel="noopener">several possible scenarios</a> where visual spoofing can be used to give threat actors the advantage:</p><!-- /wp:paragraph --> <!-- wp:list --><ul> <!-- wp:list-item --><li>Domain name spoofing</li><!-- /wp:list-item --> <!-- wp:list-item --><li>Fraudulent vanity URLs</li><!-- /wp:list-item --> <!-- wp:list-item --><li>User interface and dialog spoofing</li><!-- /wp:list-item --> <!-- wp:list-item --><li><a href="https://www.malwarebytes.com/glossary/malvertising" rel="noopener">Malvertising</a></li><!-- /wp:list-item --> <!-- wp:list-item --><li>Internationalized email forging</li><!-- /wp:list-item --> <!-- wp:list-item --><li>Profanity filter bypassing</li><!-- /wp:list-item --> </ul><!-- /wp:list --> <!-- wp:paragraph --><p>Related blog post(s):</p><!-- /wp:paragraph --> <!-- wp:list --><ul> <!-- wp:list-item --><li><a href="https://blog.malwarebytes.com/101/2017/10/out-of-character-homograph-attacks-explained/" target="_blank" rel="noopener">Out of character: Homograph attacks explained</a></li><!-- /wp:list-item --> </ul><!-- /wp:list --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-V"> <h3>VLAN</h3> <!-- wp:paragraph --><p>Is short for Virtual Local Access Network. It describes a network of systems that are simulating to be on the same network. They are bound at <a href="https://www.malwarebytes.com/glossary/osi" rel="noopener noreferrer">OSI</a> Layer 2 (the datalink layer) which means they can communicate as if connected by wire while they can in fact be on different <a href="https://www.malwarebytes.com/glossary/local-area-network" rel="noopener noreferrer">LAN</a>&#8216;s and be physically far apart. VLAN&#8217;s are often used to divide LANs into subsets that are allowed to share certain information and devices. Or to create a group of systems around the world that belong to a certain group in the same organization.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-V"> <h3>VM-aware</h3> <!-- wp:paragraph --><p>A capability of <a href="https://www.malwarebytes.com/glossary/malware">malware</a> to detect and identify that the environment it resides on is a <a href="https://www.malwarebytes.com/glossary/virtual-machine" rel="noopener">virtual machine (VM)</a>. Some methods of determining a VM are simple while others are not. Once the malware is aware that it&#8217;s on a VM, it usually ceases functioning as its supposed to. Related blog post(s):</p><!-- /wp:paragraph --> <!-- wp:list --><ul> <!-- wp:list-item --><li><a href="https://blog.malwarebytes.com/threat-analysis/2014/02/a-look-at-malware-with-virtual-machine-detection/" rel="noopener" target="_blank">A look at malware with virtual machine detection</a></li><!-- /wp:list-item --> </ul><!-- /wp:list --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-V"> <h3>Voice authentication</h3> <!-- wp:paragraph --><p>Sometimes called <em>voice ID</em>. It is a type of <a href="https://www.malwarebytes.com/glossary/biometrics">biometric</a> verification wherein a user&#8217;s voiceprint is applied to confirm his or her identity. This relies on the fact that vocal characteristics are as unique as fingerprints and iris patterns of each individual.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-V"> <h3>Voice over Internet Protocol (VoIP)</h3> <!-- wp:paragraph --><p>VoIP, short for Voice over Internet Protocol, is a technology that allows users to make voice calls over an Internet broadband connection instead of an <a href="https://www.malwarebytes.com/glossary/analog" rel="noopener">analog</a> connection. VoIP is a phone service over the Internet.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-V"> <h3>Voice phishing (vishing)</h3> <!-- wp:paragraph --><p>Vishing, short for voice phishing, is a type of phishing on mobile devices. It is carried out over-the-phone (e.g. landline, <a href="https://www.malwarebytes.com/glossary/voice-over-internet-protocol-voip" rel="noopener">VoIP</a>, smartphone). For more information, see <a href="https://blog.malwarebytes.com/101/2017/06/somethings-phishy-how-to-detect-phishing-attempts/" target="_blank" rel="noopener">this blog post</a> on how to generally detect phishing attempts.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-V"> <h3>Vulnerabilities</h3> <!-- wp:paragraph --><p>A software vulnerability is a bug or error found in a cybersecurity system and is a point of weakness which can be exploited by cybercriminals. These bad actors gain unauthorized access through network vulnerabilities and carry out cyberattacks. Learn more about&nbsp;<a href="https://www.malwarebytes.com/cybersecurity/business/what-is-vulnerability-management">vulnerability management</a>.</p><!-- /wp:paragraph --> </div> <h2>W</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Walled garden</h3> <!-- wp:paragraph --><p>This term is used in a lot of ways in computing and technology. Generally, this is an environment that limits user access to certain content and services.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>WAP</h3> <!-- wp:paragraph --><p>Stands for <em>Wireless Application Protocol</em>. This is a standardized set of communication protocols that allows wireless devices (usually mobile devices, two-way radios, smartphones, and pagers) to securely access the Internet. WAP supports most wireless networks and is supported by all <a href="https://www.malwarebytes.com/glossary/operating-system-os">operating systems</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Warez</h3> <!-- wp:paragraph --><p>Is an internet slang that means software that has been illegally copied and made available to users. This shouldn&#8217;t be confused with <a href="https://www.malwarebytes.com/glossary/shareware">shareware</a> or <a href="https://www.malwarebytes.com/glossary/freeware">freeware</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Warm boot</h3> <!-- wp:paragraph --><p>In computing, this is also called a <em>soft boot</em>. It restore the system to its initial state without shutting it down completely. It is often used when applications are hanging or frozen, or after installing software. In Windows ,for example, this can be achieved by choosing &#8220;Restart&#8221; in the shutdown menu. Also see <a href="https://www.malwarebytes.com/glossary/cold-boot">cold boot</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Warm standby</h3> <!-- wp:paragraph --><p>It is a redundancy method involving two systems running simultaneously: the primary system at the foreground and a secondary or backup system at the background.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>WASP</h3> <!-- wp:paragraph --><p>Short for <em>wireless application service provider</em>. These are services similar to regular application service providers (ASP) but are accessible via wireless devices, such as smartphones and personal digital assistants (PDAs).</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Watering hole attack</h3> <!-- wp:paragraph --><p>A watering hole attack is a targeted attack strategy in which attackers infect a website they know their intended victim(s) will visit, or lure them to a website of their own making. The attacker may single out intended targets, or infect anyone who visits the website unprotected. Watering hole attacks include a mix of <a href="https://www.malwarebytes.com/glossary/social-engineering">social engineering</a>, <a href="https://www.malwarebytes.com/glossary/hacker">hacking</a>, and <a href="https://www.malwarebytes.com/glossary/drive-by-download">drive-by infections</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Wayback Machine</h3> <!-- wp:paragraph --><p>This is a website that allows Internet users to see what certain websites look like at some point in the past. These sites are archived and are currently inaccessible outside the Wayback Machine. The Wayback Machine is created by the Internet Archive.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Wearable computer</h3> <!-- wp:paragraph --><p>Also known as body-borne computers or wearables. An electronic computing device that can either be strapped on or carried around on (like being incorporated in clothing and personal accessories) a user&#8217;s body. This is also capable of storing, processing, and transmitting data.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Wearable device</h3> <!-- wp:paragraph --><p>See: <a href="https://www.malwarebytes.com/glossary/wearable-computer" rel="noopener">Wearable computer</a></p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Web</h3> <!-- wp:paragraph --><p>Pertains to the World Wide Web (W3). Although many define the Web as &#8220;the internet&#8221;, they are not synonymous. The Web is a way of accessing information that is on the internet. It&#8217;s an information-sharing model. The internet, on the other hand, is a massive global network infrastructure comprising of millions of computers.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Web application security</h3> <!-- wp:paragraph --><p>This deals with the security of websites, Web applications, and Web services. It aims to address and/or fulfill the four principles of security, which are confidentiality, integrity, availability, and nonrepudiation.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Web inject</h3> <!-- wp:paragraph --><p>A web inject is HTML or JavaScript code injected into affected Web page before the page renders on the user&#8217;s browser. Other form(s): Webinject</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Web scraping</h3> <!-- wp:paragraph --><p>Also known as screen scraping, Web data extraction, and Web harvesting among others. This is an automated technique used in extracting large amounts of data from websites to be saved locally in a computer as a file or a database (in spreadsheet format). Web scraping is usually done with the aid of software.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Web skimmer</h3> <!-- wp:paragraph --><p>A web skimmer is usually a piece of malicious JavaScript (JS) code embedded in web payment pages to perform <a href="https://www.malwarebytes.com/glossary/skimming" rel="noopener noreferrer">skimming</a>. Such <a href="https://www.malwarebytes.com/glossary/malware">malware</a> arrives on target pages via a compromised third-party script service. Web skimmers were designed to retrieve customer payment information. Magecart is a group known to use web skimmers. For more information, see <a href="https://blog.malwarebytes.com/cybercrime/2018/09/how-to-protect-your-data-from-magecart-and-other-e-commerce-attacks/" target="_blank" rel="noopener noreferrer">this blog post</a> on how you can protect yourself from Magecart and other e-commerce attacks. Synonym(s): digital skimmer</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Web-enabled</h3> <!-- wp:paragraph --><p>A product or service is called &#8220;Web-enabled&#8221; if it can be used in conjunction with or through the World Wide Web. This was once a famous buzzword; nowadays, it&#8217;s rare to find products or services that don&#8217;t use the Web.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Website defacement</h3> <!-- wp:paragraph --><p>Website defacements happen when a hacker compromises a site to promote a message, cause general annoyance, <a href="https://blog.malwarebytes.com/cybercrime/2018/06/red-hen-website-suffers-seo-spam-compromise/" rel="noopener" target="_blank">boost search rankings</a>, and also potentially load a webpage with <a href="https://www.malwarebytes.com/glossary/malware">malware</a> or <a href="https://www.malwarebytes.com/glossary/spyware">spyware</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Website spoofing</h3> <!-- wp:paragraph --><p>Website spoofing happens when an attacker creates an imitation website designed to look like the real thing. <a href="https://www.malwarebytes.com/glossary/threat-actor" rel="noopener noreferrer">Threat actors</a> may use real company logos, design, and URLs similar to the target website to enhance the spoof and make it more convincing.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Wetware</h3> <!-- wp:paragraph --><p>A slang term pertaining to the human element of an IT architecture. An IT system is comprised of hardware (or the physical computers), software (or the applications installed on the computers), and wetware (or the people using and maintaining the computers).</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Whack-a-mole</h3> <!-- wp:paragraph --><p>In IT, this is a term used to describe a situation where a problem keeps recurring after it is supposedly fixed. The term was inspired by the arcade game, Whac-A-Mole. An example of a whack-a-mole situation is when one cleans a malware-ridden computer only to find it re-infected again.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Whaling</h3> <!-- wp:paragraph --> <p>Also known as <em>whale phishing</em>. It&#8217;s a type of fraud or <a href="https://www.malwarebytes.com/phishing">phishing</a> scheme that targets high-profile end-users, usually C-level businessmen, politicians, and celebrities. Fraudsters behind whaling campaigns aim to trick targets into giving out their personal information and/or business credentials. Whaling is usually done through social engineering efforts.</p> <!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>White hat hacker</h3> <!-- wp:paragraph --><p>A term most commonly used within the computer security circle to describe a type <a href="https://www.malwarebytes.com/glossary/hacker" rel="noopener noreferrer">hacker</a> who uses their knowledge and skills to help improve the security of a product and/or service by identifying their weak points before <a href="https://www.malwarebytes.com/glossary/threat-actor" rel="noopener noreferrer">threat actors</a> take advantage of them.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>White screen of death (WSoD)</h3> <!-- wp:paragraph --><p>This is an error in the OS, particularly Mac OS and Linux, causing it to display a white screen. A WSoD also happens when an application, such as a Web page, locks up or freezes. Sometimes, a WSoD also happens on Windows. Synonym: <em>White death</em></p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>White space padding</h3> <!-- wp:paragraph --><p>White space padding is an old trick where multiple white spaces are inserted into a filename to hide the real extension from the victim, who would otherwise have seen, for example, <em>.exe</em> at the end. Spammers have applied this trick to naming malicious attachments to allay suspicions from careful email users.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Whitelist</h3> <!-- wp:paragraph --><p>In computing, it is a list of resources and destinations that we decided to trust. Application whitelisting is a method that allows only specific software and applications to run in order to maintain security. This is more restrictive than <a href="https://www.malwarebytes.com/glossary/blacklist" rel="noopener noreferrer">blacklisting</a>&nbsp;processes, which has pros and cons. Whitelisting is more secure yet time-consuming to manage.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>WHOIS</h3> <!-- wp:paragraph --><p>Pronounced &#8220;who is&#8221;. This is not an abbreviation; however, it stands for &#8220;Who is responsible for this domain name?&#8221; It&#8217;s an internet service used to look up information about domain names.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Wi-Fi</h3> <!-- wp:paragraph --><p>Is a trademarked phrase for connections compliant with the IEEE 802.11 standard. This is a wireless technology used to provide internet and other <a href="https://www.malwarebytes.com/glossary/wide-area-network-wan">WLAN</a> connections. Wi-Fi-certified products are interoperable with each other. The IEEE 802.11 is often combined with a letter to indicate the radio frequency band the products use.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Wide Area Network (WAN)</h3> <!-- wp:paragraph --><p>A Wide Area Network (WAN) is a private telecommunications network that interconnects multiple <a href="https://www.malwarebytes.com/glossary/local-area-network" rel="noopener noreferrer">LANs</a> and <a href="https://www.malwarebytes.com/glossary/metropolitan-area-network-man" rel="noopener noreferrer">MANs</a>. It covers a wide geographical area. A router is typically used to connect a LAN to a WAN.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Windows Sockets API (Winsock)</h3> <!-- wp:paragraph --><p>The Windows Sockets API&mdash;shortened to Winsock&mdash;is a standard that specifies how Windows networking software should deal with TCP/IP traffic. One of the features of Winsock 2 is the <a href="https://www.malwarebytes.com/glossary/layered-service-provider-lsp" rel="noopener noreferrer">LSP</a>. For more information, see <a href="https://blog.malwarebytes.com/cybercrime/2014/10/changes-in-the-lsp-stack/" target="_blank" rel="noopener noreferrer">this blog post</a> that contains information about LSP hijacking.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Wireless</h3> <!-- wp:paragraph --><p>Is the name for any means of transferring information or power over a distance without the need of an electrical conductor (wire).</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Wiretap Trojan</h3> <!-- wp:paragraph --><p>A program capable of secretly recording <a href="https://www.malwarebytes.com/glossary/voice-over-internet-protocol-voip">VoIP</a> calls and IM conversations. This malware usually comes with a <a href="https://www.malwarebytes.com/glossary/backdoor" rel="noopener">backdoor</a>, which allows a <a href="https://www.malwarebytes.com/glossary/threat-actor" rel="noopener">threat actor</a> to retrieve the recordings.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>WLAN</h3> <!-- wp:paragraph --><p>Stands for <em>Wireless Local Area Network</em>. This is also referred to as LAWN or Local Area Wireless Network. This is a type of network connection that uses high-frequency radio waves rather than wires to communicate. As it&#8217;s wireless, users connected to a WLAN are free to move around provided they stay within the coverage area. Also see <a href="https://www.malwarebytes.com/glossary/wi-fi" rel="noopener noreferrer">Wi-Fi</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Worm</h3> <!-- wp:paragraph --><p>Worms are a type of <a href="https://www.malwarebytes.com/glossary/malware">malware</a> similar to <a href="https://www.malwarebytes.com/glossary/virus">viruses</a>, but they do not need to be attached to another program in order to spread.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>WoT</h3> <!-- wp:paragraph --><p>Stands for the Web of Things. This is considered as a subset of <a href="https://www.malwarebytes.com/glossary/iot" rel="noopener">IoT</a> that focuses on software standards and frameworks. One can think of them as everyday objects capable of communicating with Web services.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>WPA</h3> <!-- wp:paragraph --><p>Is short for Wi-Fi Protected Access. WPA and WPA2 are security protocols designed for the secure access of <a href="https://www.malwarebytes.com/glossary/wi-fi" rel="noopener">Wi-Fi</a>. WPA was intended as an easy upgrade from WEP, but that turned out to be less straightforward than expected. Later WPA2 replaced WPA and supports CCMP, an encryption mode with strong security. See also <a href="https://www.malwarebytes.com/glossary/wpa2" rel="noopener">WPA2</a> and <a href="https://www.malwarebytes.com/glossary/wpa-psk" rel="noopener">WPA-PSK</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>WPA-PSK</h3> <!-- wp:paragraph --><p>Short for <em>Wi-Fi Protected Access Pre-Shared Key</em>. Also known as <em>WPA Personal</em>. This is a security method that uses Pre-Shared Key (PSK) authentication, which is designed for homes, to validate users over a wireless internet. WPA-PSK is a variation of the <a href="https://www.malwarebytes.com/glossary/wpa" rel="noopener">WPA</a> protocol. See also <a href="https://www.malwarebytes.com/glossary/wpa2" rel="noopener">WPA2</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>WPA2</h3> <!-- wp:paragraph --><p>Short for <em>Wi-Fi Protected Access II</em> or <em>Wi-Fi Protected Access 2.&nbsp;</em>This is a security standard for computers connected to the internet over a wireless network. Its purpose is to achieve complete compliance with the&nbsp;IEEE802, an IEEE standard for <a href="https://www.malwarebytes.com/glossary/local-area-network" rel="noopener">LANs</a> and MANs. WPA2 generally doesn&#8217;t work with old network cards. See also <a href="https://www.malwarebytes.com/glossary/wpa" rel="noopener">WPA</a> and <a href="https://www.malwarebytes.com/glossary/wpa-psk">WPA-PSK</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>WPAN</h3> <!-- wp:paragraph --><p>Stands for <em>Wireless Personal Area Network</em>. This is a network for various interconnected devices within the circumference of an individual&#8217;s workspace. The connection among these devices is usually wireless, and the area of coverage is no greater than 10 meters. An example of a WPAN technology that permits this short-range communication is <a href="https://www.malwarebytes.com/glossary/bluetooth" rel="noopener">Bluetooth</a>. See also <a href="https://www.malwarebytes.com/glossary/wpa2" rel="noopener">WPA2</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>Write protection</h3> <!-- wp:paragraph --><p>The ability of a physical, hardware device or software to prevent old information from being overwritten and new data from being written. Write protection features are normally found in computers and devices that can carry or store information.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-W"> <h3>WYSIWYG</h3> <!-- wp:paragraph --><p>WYSIWYG, pronounced &#8220;wiz-ee-wig&#8221;, stands for <em>What You See Is What You Get</em>. In computing, it refers to an editor or tool that allows the developer to see the changes they make on what they&#8217;re creating in real time.</p><!-- /wp:paragraph --> </div> <h2>X</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-X"> <h3>XaaS</h3> <!-- wp:paragraph --><p>XaaS is the abbreviated form of <em>Anything-as-a-Service</em>. XaaS is a catch-all term referring to all available services provided online instead of locally or on-premise. Synonym: Everything-as-a-Service, <a href="https://www.malwarebytes.com/glossary/cloud-computing">Cloud computing</a></p><!-- /wp:paragraph --> </div> <h2>Y</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-Y"> <h3>Y2K</h3> <!-- wp:paragraph --><p>Stands for &#8220;year 2000&#8221;. This abbreviation is well known today because of the term &#8220;the Y2K problem&#8221; or &#8220;the millennium bug&#8221;. The Y2K problem stemmed from fears of computer programs that store year values as two-digits figures&mdash;&#8221;97&#8243; to mean the year 1997, for example&mdash;would cause problems as the year 2000 rolls in.</p><!-- /wp:paragraph --> </div> <h2>Z</h2> <div class="glossary__content-item" data-tab-related="glossary-tab-Z"> <h3>Zbot</h3> <!-- wp:paragraph --><p>Zbot is a known family of <a href="https://www.malwarebytes.com/glossary/trojan" rel="noopener noreferrer">Trojans</a> capable of stealing user information, such as banking credentials, using <a href="https://www.malwarebytes.com/glossary/man-browser-mitb">man-in-the-browser (MiTB)</a> keystroke logging and form grabbing. For more information, see <a href="https://blog.malwarebytes.com/cybercrime/2017/01/zbot-with-legitimate-applications-on-board/" target="_blank" rel="noopener">this blog post</a> on the analysis of a Zbot variant. Synonym: Zeus/ZeuS</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-Z"> <h3>Zero Administration for Windows</h3> <!-- wp:paragraph --><p>Abbreviated as ZAW. This refers to an initiative led by Microsoft that allows administrators to install, update, and manage Windows from a central server to <a href="https://www.malwarebytes.com/glossary/local-area-network" rel="noopener noreferrer">LAN</a>-connected machines. Microsoft has aimed to decrease the amount of time it takes for administrators to perform these tasks and to reduce the cost of maintaining PCs in large corporations.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-Z"> <h3>Zero-day</h3> <!-- wp:paragraph --> <p>A zero-day vulnerability is an exploitable vulnerability in software that has not been disclosed yet. Zero days sarcastically stands for the time the software creator has then left to patch the vulnerability. More information: <a href="https://www.malwarebytes.com/zero-day">What is a Zero-Day</a>.</p> <!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-Z"> <h3>Zero-trust</h3> <!-- wp:paragraph --><p>Zero-trust is a security model wherein no one inside or outside a network is trusted by default, thus requiring users to verify themselves when they want to use a network&#8217;s resource.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-Z"> <h3>Zombie</h3> <!-- wp:paragraph --><p>Is the description for systems that have been infected by a <a href="https://www.malwarebytes.com/glossary/trojan">Trojan</a> that added the system to a <a href="https://www.malwarebytes.com/glossary/botnet">botnet</a>. The term is used because the system is taken out of control of its owner, and now obeys the botherder like a zombie. You can read more about these botnets in our blog post,<a href="https://blog.malwarebytes.com/cybercrime/2015/02/the-facts-about-botnets/" target="_blank" rel="noopener">The Facts about Botnets</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-Z"> <h3>Zombie network</h3> <!-- wp:paragraph --><p>See <a href="https://www.malwarebytes.com/glossary/botnet" rel="noopener noreferrer">botnet</a>.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-Z"> <h3>Zombie process</h3> <!-- wp:paragraph --><p>Also known as <em>defunct process</em>. It&#8217;s what you call a process in its terminated state. In programs with parent-child functions, a child usually sends an exit status message to its parent after executing. Unless the parent receives and acknowledges this message, the child is in a &#8216;zombie&#8217; state. This means that it has executed but hasn&#8217;t exited.</p><!-- /wp:paragraph --> </div> <div class="glossary__content-item" data-tab-related="glossary-tab-Z"> <h3>Zoombombing</h3> <!-- wp:paragraph --><p>Also known as Zoom squatting, occurs when an unauthorized user joins a Zoom conference, either by guessing the Zoom meeting ID number, reusing a Zoom meeting ID from a previous meeting, or using a Zoom ID received from someone else. In the latter case, the Zoom meeting ID may have been shared with the Zoombomber by someone who was invited to the meeting or circulated among Zoombombers online.</p><!-- /wp:paragraph --> </div> </div> </div><p class="btn-main btn-primary-white back-to-top">Back To Top</p></div> </div><!-- .entry-content --> </article><!-- #post-515 --> </main><!-- #main --> <span id="kadence-conversion-end-of-content"></span> <footer id="colophon" class="site-footer"> <div class="site-footer__top"> <div class="container"> <div class="site-footer__info"> <a class="footer-logo" href="https://www.malwarebytes.com/" rel="home" id="cta-navbar-footer-company-logo-en"> <img width="1240" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/07/footer-logo-1.svg" class="attachment-full size-full" alt="MalwareBytes-Footer-Logo" width="150" height="46" decoding="async" loading="lazy" /> </a> <p class="site-footer__description"> Cyberprotection for every one. </p> </div> <div class="site-footer__row u-flex-columns"> <div class="u-flex-column u-flex-col-lg-2 u-flex-col-sm-6"> <p style="font-style:normal;font-weight:500">COMPUTER SECURITY</p> <div class="menu-footer-computer-security-container"><ul id="menu-footer-computer-security" class="menu"><li id="menu-item-119904" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119904"><a href="https://www.malwarebytes.com/rootkit" id="cta-mb-footer-rootkit-scanner">Rootkit Scanner</a></li> <li id="menu-item-119905" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119905"><a href="https://www.malwarebytes.com/solutions/trojan-scanner" id="cta-mb-footer-trojan-scanner">Trojan Scanner</a></li> <li id="menu-item-119906" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119906"><a href="https://www.malwarebytes.com/solutions/free-antivirus" id="cta-mb-footer-free-antivirus">Free Antivirus</a></li> <li id="menu-item-119907" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119907"><a href="https://www.malwarebytes.com/solutions/virus-scanner" id="cta-mb-footer-virus-scan">Free Virus Scan</a></li> <li id="menu-item-119908" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119908"><a href="https://www.malwarebytes.com/premium" id="cta-mb-footer-premium-protection">Premium protection</a></li> </ul></div> <p style="font-style:normal;font-weight:500">MOBILE SECURITY</p> <div class="wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained" style="padding-bottom:var(--wp--preset--spacing--40)"><div class="widget widget_nav_menu"><div class="menu-footer-android-security-container"><ul id="menu-footer-android-security" class="menu"><li id="menu-item-119910" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119910"><a href="https://www.malwarebytes.com/android-antivirus" id="cta-mb-footer-android-security">Antivirus for Android</a></li> </ul></div></div> <figure class="wp-block-image size-large"><a href="https://go.onelink.me/app/516cebeb"><img loading="lazy" decoding="async" width="135" height="40" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/08/google_play_store_button.png?w=135" alt="google play store" class="wp-image-6309"/></a></figure> </div> <div class="wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained"><div class="widget widget_nav_menu"><div class="menu-footer-ios-security-container"><ul id="menu-footer-ios-security" class="menu"><li id="menu-item-119913" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119913"><a href="https://www.malwarebytes.com/ios" id="cta-mb-footer-ios-security">iOS Security and Spam Blocker</a></li> </ul></div></div> <figure class="wp-block-image size-large"><a href="https://apps.apple.com/US/app/id1327105431?mt=8"><img loading="lazy" decoding="async" width="120" height="40" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/08/apple_app_store_button_dark.png?w=120" alt="apple store icon" class="wp-image-6313"/></a></figure> </div> </div> <div class="u-flex-column u-flex-col-lg-2 u-flex-col-sm-6"> <p style="font-style:normal;font-weight:500">PRIVACY PROTECTION</p> <div class="menu-footer-privacy-protection-container"><ul id="menu-footer-privacy-protection" class="menu"><li id="menu-item-119921" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119921"><a href="https://www.malwarebytes.com/vpn" id="cta-mb-footer-privacy-vpn">Privacy VPN (Virtual Private Network)</a></li> <li id="menu-item-120239" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120239"><a href="https://www.malwarebytes.com/digital-footprint" id="cta-mb-footer-digital-footprint-scan">Digital Footprint Scan</a></li> <li id="menu-item-119923" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119923"><a href="https://www.malwarebytes.com/solutions/dark-web-monitoring" id="cta-mb-footer-dark-web-monitoring">Dark Web Monitoring</a></li> <li id="menu-item-119924" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119924"><a href="https://www.malwarebytes.com/adwcleaner" id="cta-mb-footer-adware-removal-adwcleaner">Adware Removal</a></li> <li id="menu-item-119925" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119925"><a href="https://www.malwarebytes.com/browserguard" id="cta-mb-footer-adblocker-browserguard">Ad Blocker</a></li> </ul></div> <p style="font-style:normal;font-weight:500">IDENTITY PROTECTION</p> <div class="menu-footer-identity-protection-container"><ul id="menu-footer-identity-protection" class="menu"><li id="menu-item-120211" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120211"><a href="https://www.malwarebytes.com/identity-theft-protection" id="cta-mb-footer-identity-monitoring-alerts">Identity Monitoring &#038; Alerts</a></li> <li id="menu-item-120212" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120212"><a href="https://www.malwarebytes.com/identity-theft-protection" id="cta-mb-footer-credit-monitoring-reporting">Credit Monitoring &#038; Reporting</a></li> <li id="menu-item-120213" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120213"><a href="https://www.malwarebytes.com/identity-theft-protection" id="cta-mb-footer-identity-recovery-resolution">Identity Recovery &#038; Resolution</a></li> <li id="menu-item-120214" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120214"><a href="https://www.malwarebytes.com/identity-theft-protection" id="cta-mb-footer-identity-theft-insurance">ID Theft Insurance</a></li> <li id="menu-item-120215" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120215"><a href="https://www.malwarebytes.com/personal-data-remover" id="cta-mb-footer-personal-data-remover-pdr">Personal Data Remover</a></li> </ul></div> </div> <div class="u-flex-column u-flex-col-lg-3 u-flex-col-sm-6"> <p style="font-style:normal;font-weight:500">LEARN ABOUT CYBERSECURITY</p> <div class="menu-footer-learn-about-cybersecurity-container"><ul id="menu-footer-learn-about-cybersecurity" class="menu"><li id="menu-item-120251" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120251"><a href="https://www.malwarebytes.com/blog">Blog</a></li> <li id="menu-item-120244" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120244"><a href="https://www.malwarebytes.com/social-engineering">Social Engineering</a></li> <li id="menu-item-120220" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120220"><a href="https://www.malwarebytes.com/phishing">Phishing</a></li> <li id="menu-item-120221" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120221"><a href="https://www.malwarebytes.com/solutions/ransomware-protection">Ransomware</a></li> <li id="menu-item-120246" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120246"><a href="https://www.malwarebytes.com/malware">Malware</a></li> <li id="menu-item-120222" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120222"><a href="https://www.malwarebytes.com/cybersecurity/basics/antivirus">Antivirus</a></li> <li id="menu-item-120223" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120223"><a href="https://www.malwarebytes.com/what-is-vpn">What is a VPN?</a></li> <li id="menu-item-120224" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120224"><a href="https://www.malwarebytes.com/doxxing">Doxxing</a></li> </ul></div> <p style="font-style:normal;font-weight:500">PARTNER WITH MALWAREBYTES</p> <div class="menu-footer-partner-with-mb-container"><ul id="menu-footer-partner-with-mb" class="menu"><li id="menu-item-120226" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120226"><a href="https://www.malwarebytes.com/techbench" id="cta-mb-footer-computer-repair-techbench">Computer Repair</a></li> <li id="menu-item-120227" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120227"><a href="https://www.malwarebytes.com/affiliates" id="cta-mb-footer-affiliates">Affiliates</a></li> </ul></div> <p style="font-style:normal;font-weight:500">ADDRESS</p> <p class="address-text address-global">One Albert Quay<br>2nd Floor<br>Cork T12 X8N6<br>Ireland</p> <p class="address-text address-usa-ca hidden">3979 Freedom Circle<br>12th Floor<br>Santa Clara, CA 95054</p> </div> <div class="site-footer__col u-flex-column u-flex-col-lg-2 u-flex-col-sm-6"> <p style="font-style:normal;font-weight:500">ABOUT MALWAREBYTES</p> <div class="menu-footer-about-mb-container"><ul id="menu-footer-about-mb" class="menu"><li id="menu-item-120230" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120230"><a href="https://www.malwarebytes.com/jobs" id="cta-mb-footer-careers">Careers</a></li> <li id="menu-item-120231" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120231"><a href="https://www.malwarebytes.com/press/" id="cta-mb-footer-press">News and Press</a></li> <li id="menu-item-120232" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120232"><a href="https://www.malwarebytes.com/secure" id="cta-mb-footer-vulnerability-discolsure">Vulnerability Disclosure</a></li> <li id="menu-item-120233" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120233"><a href="https://forums.malwarebytes.com/forum/122-false-positives" id="cta-mb-footer-false-positive">False Positive Report</a></li> <li id="menu-item-120234" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120234"><a href="https://forums.malwarebytes.com/" id="cta-mb-footer-forums">Forums</a></li> </ul></div> <p style="font-style:normal;font-weight:500">GET HELP</p> <div class="menu-footer-get-help-container"><ul id="menu-footer-get-help" class="menu"><li id="menu-item-120236" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120236"><a href="https://support.malwarebytes.com/hc/en-us">Help Center</a></li> <li id="menu-item-120237" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120237"><a href="https://my.malwarebytes.com">Sign in to MyAccount</a></li> </ul></div> <div class="wp-block-group has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained" style="background-color:#ffffff12;padding-top:var(--wp--preset--spacing--20);padding-right:var(--wp--preset--spacing--20);padding-bottom:var(--wp--preset--spacing--20);padding-left:var(--wp--preset--spacing--20)"> <figure class="wp-block-image size-large"><a href="https://www.threatdown.com/?utm_campaign=mwb-referral&amp;utm_source=malwarebytes.com&amp;utm_medium=referral&amp;utm_content=cta-mb-footer-threatdown-logo"><img decoding="async" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/11/ThreatDown_Horizontal_Reverse-2-2.svg?w=1024" alt="Threatdown Logo" class="wp-image-98222"/></a></figure> <div class="widget widget_nav_menu"><div class="menu-footer-threatdown-container"><ul id="menu-footer-threatdown" class="menu"><li id="menu-item-120248" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120248"><a href="https://www.threatdown.com/?utm_campaign=mwb-referral&#038;utm_source=malwarebytes.com&#038;utm_medium=referral&#038;utm_content=cta-mb-footer-threatdown-endpoint-solution" id="cta-mb-footer-threatdown-endpoint-security-solution">Business Endpoint Security Solutions</a></li> <li id="menu-item-120249" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120249"><a href="https://www.threatdown.com/partner-program/msp/?utm_campaign=mwb-referral&#038;utm_source=malwarebytes.com&#038;utm_medium=referral&#038;utm_content=cta-en-us-footer-partner-msp" id="https://www.threatdown.com/partner-program/msp/">Managed Service Provider (MSP) Program</a></li> </ul></div></div></div> </div> <div class="site-footer__connect u-flex-column u-flex-col-lg-3"> <ul class="site-footer__social-icons u-flex-center"> <li> <a href="https://twitter.com/malwarebytes" id="cta-footer-social-twitter-en" class="social socicon-twitter" target="_blank" rel="noopener"> <img width="1240" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2024/01/x-logo.svg?w=1240" class="attachment-social-icon-image size-social-icon-image" alt="Twitter icon" width="30" height="20" decoding="async" loading="lazy" /> <span class="screen-reader-text">Twitter</span> </a> </li> <li> <a href="https://www.facebook.com/Malwarebytes" id="cta-footer-social-facebook-en" class="social socicon-facebook" target="_blank" rel="noopener"> <img width="1240" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/07/icon-facebook.svg?w=1240" class="attachment-social-icon-image size-social-icon-image" alt="Icon facebook" width="30" height="20" decoding="async" loading="lazy" /> <span class="screen-reader-text">Facebook</span> </a> </li> <li> <a href="https://www.linkedin.com/company/malwarebytes" id="cta-footer-social-linkedin-en" class="social socicon-linkedin" target="_blank" rel="noopener"> <img width="1240" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/07/icon-linkedin.svg?w=1240" class="attachment-social-icon-image size-social-icon-image" alt="Icon Linkedin" width="30" height="20" decoding="async" loading="lazy" /> <span class="screen-reader-text">LinkedIn</span> </a> </li> <li> <a href="https://www.youtube.com/user/Malwarebytes" id="cta-footer-social-youtube-en" class="social socicon-youtube" target="_blank" rel="noopener"> <img width="1240" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/07/icon-youtube.svg?w=1240" class="attachment-social-icon-image size-social-icon-image" alt="Icon youtube" width="30" height="20" decoding="async" loading="lazy" /> <span class="screen-reader-text">Youtube</span> </a> </li> <li> <a href="https://www.instagram.com/malwarebytesofficial" id="cta-footer-social-instagram-en" class="social socicon-instagram-v2" target="_blank" rel="noopener"> <img width="1240" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/07/icon-instagram.svg?w=1240" class="attachment-social-icon-image size-social-icon-image" alt="Icon instagram" width="30" height="20" decoding="async" loading="lazy" /> <span class="screen-reader-text">Instagram</span> </a> </li> </ul> <div class="site-footer__newsletter"> <h2>Cybersecurity info you can’t live without</h2> <p>Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.</p> <form action="https://www.malwarebytes.com/newsletter/" class="newsletter-form"> <div class="newsletter-form__inline"> <label>Email Address</label> <input type="email" name="email" id="cta-footer-newsletter-input-email-en" placeholder="Email Address" required class="newsletter-form__email"> <input type="hidden" class="newsletter-form__pageurl" value="https://www.malwarebytes.com/glossary"> <input name="source" type="hidden" value=""> <input type="submit" value="Sign Up" class="newsletter-form__btn" id="cta-footer-newsletter-subscribe-email-en"> </div> <div class="newsletter-form__validate hidden"> <span></span> </div> </form> </div> </div> </div> </div> </div> <div class="site-footer__bottom"> <div class="container"> <div class="u-flex-columns"> <!--Weglot 4.2.9--><aside data-wg-notranslate="" class="country-selector weglot-dropdown close_outside_click closed weglot-shortcode wg-" tabindex="0" aria-expanded="false" aria-label="Language selected: English"><ul role="none"></ul></aside> <div class="u-flex-column u-flex-col-lg-9 site-footer__bottom-right"> <ul id="menu-footer-bottom-menu" class="footer-bottom-menu u-flex-center"><li id="menu-item-2936" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-2936"><a href="https://www.malwarebytes.com/legal" id="cta-en-us-footernavigation-legal-_legal-click">Legal</a></li> <li id="menu-item-2937" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-2937"><a href="https://www.malwarebytes.com/legal/privacy-policy" id="cta-en-us-footernavigation-legal-_legal_privacy_policy-click">Privacy</a></li> <li id="menu-item-2940" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-2940"><a href="https://www.malwarebytes.com/tos" id="cta-en-us-footernavigation-legal-_tos-click">Terms of Service</a></li> <li id="menu-item-2938" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-2938"><a href="https://www.malwarebytes.com/accessibility" id="cta-en-us-footernavigation-legal-_accessibility-click">Accessibility</a></li> <li id="menu-item-116900" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-116900"><a href="https://www.malwarebytes.com/impressum">Imprint</a></li> </ul> <p class="site-footer__copyright"> © 2024 All Rights Reserved </p> </div> </div> </div> </div> </footer><!-- #colophon --> </div><!-- #page --> <script> var global_variables = { when: '7/3/2023 2:14:31 PM', site : { language: 'en', country: 'us', origin: 'https://www.malwarebytes.com', phoneNumbers: { 'US': {'view':'+1-800-520-2796','call':'18005202796'}, 'GB': {'view':'+44 (800) 368-8486','call':'448003688486'}, 'FR': {'view':'+33 (800) 909-009','call':'33800909009'}, 'ES': {'view':'+34 (900) 823-509','call':'34900823509'}, 'DE': {'view':'+49 (800) 723-4800','call':'498007234800'}, 'IT': {'view':'+39 (800) 972-511','call':'39800972511'}, 'SG': {'view':'+65 6813-2150','call':'6568132150'}, 'AU': {'view':'1800-745-824','call':'1800745824'}, 'NZ': {'view':'0800-446-541','call':'0800446541'} }, endpoints: { carts: { lira: 'https://ecom.malwarebytes.com', onepay: 'https://buy.malwarebytes.com', }, }, downloadLinks: { vpn: { mac: 'https://downloads.malwarebytes.com/file/mbprivacy-mac', windows: 'https://downloads.malwarebytes.com/file/mbprivacy-online', ios: 'https://apps.apple.com/us/app/malwarebytes-privacy-vpn/id1504101226', android: 'https://play.google.com/store/apps/details?id=org.malwarebytes.harpocrates' }, free: { mac: "https://www.malwarebytes.com/mac-download", windows: "https://www.malwarebytes.com/mwb-download/thankyou", ios: "https://apps.apple.com/US/app/id1327105431?mt=8", android: "https://play.google.com/store/apps/details?id=org.malwarebytes.antimalware", }, }, apiHostname: 'https://www-api.malwarebytes.com', //apiHostname: 'https://staging-www-api.malwarebytes.com', liraCartLinkEndpoint: 'https://ecom.malwarebytes.com' } } </script> <script> (function(){let request = new XMLHttpRequest(); let url = 'ht' + 'tps:' + '//' + 'api.weglot.com/' + 'pageviews?api_key=' + 'wg_ab7feeaf115f3476db3eec82a65b414c4'; let data = JSON.stringify({ url: location.protocol + '//' + location.host + location.pathname, language: document.getElementsByTagName('html')[0].getAttribute('lang'), browser_language: (navigator.language || navigator.userLanguage) } ); request.open('POST', url, true); request.send(data); })(); </script> <script>!function(t){"use strict";t.loadCSS||(t.loadCSS=function(){});var e=loadCSS.relpreload={};if(e.support=function(){var e;try{e=t.document.createElement("link").relList.supports("preload")}catch(t){e=!1}return function(){return e}}(),e.bindMediaToggle=function(t){function e(){t.media=a}var a=t.media||"all";t.addEventListener?t.addEventListener("load",e):t.attachEvent&&t.attachEvent("onload",e),setTimeout(function(){t.rel="stylesheet",t.media="only x"}),setTimeout(e,3e3)},e.poly=function(){if(!e.support())for(var a=t.document.getElementsByTagName("link"),n=0;n<a.length;n++){var o=a[n];"preload"!==o.rel||"style"!==o.getAttribute("as")||o.getAttribute("data-loadcss")||(o.setAttribute("data-loadcss",!0),e.bindMediaToggle(o))}},!e.support()){e.poly();var a=t.setInterval(e.poly,500);t.addEventListener?t.addEventListener("load",function(){e.poly(),t.clearInterval(a)}):t.attachEvent&&t.attachEvent("onload",function(){e.poly(),t.clearInterval(a)})}"undefined"!=typeof exports?exports.loadCSS=loadCSS:t.loadCSS=loadCSS}("undefined"!=typeof global?global:this);</script> <script type='text/javascript' id='rocket-browser-checker-js-after'>"use strict";var _createClass=function(){function defineProperties(target,props){for(var i=0;i<props.length;i++){var descriptor=props[i];descriptor.enumerable=descriptor.enumerable||!1,descriptor.configurable=!0,"value"in descriptor&&(descriptor.writable=!0),Object.defineProperty(target,descriptor.key,descriptor)}}return function(Constructor,protoProps,staticProps){return protoProps&&defineProperties(Constructor.prototype,protoProps),staticProps&&defineProperties(Constructor,staticProps),Constructor}}();function _classCallCheck(instance,Constructor){if(!(instance instanceof Constructor))throw new TypeError("Cannot call a class as a function")}var MdBrowserCompatibilityChecker=function(){function MdBrowserCompatibilityChecker(options){_classCallCheck(this,MdBrowserCompatibilityChecker),this.passiveSupported=!1,this._checkPassiveOption(this),this.options=!!this.passiveSupported&&options}return _createClass(MdBrowserCompatibilityChecker,[{key:"_checkPassiveOption",value:function(self){try{var options={get passive(){return!(self.passiveSupported=!0)}};window.addEventListener("test",null,options),window.removeEventListener("test",null,options)}catch(err){self.passiveSupported=!1}}},{key:"initRequestIdleCallback",value:function(){!1 in window&&(window.requestIdleCallback=function(cb){var start=Date.now();return setTimeout(function(){cb({didTimeout:!1,timeRemaining:function(){return Math.max(0,50-(Date.now()-start))}})},1)}),!1 in window&&(window.cancelIdleCallback=function(id){return clearTimeout(id)})}},{key:"isDataSaverModeOn",value:function(){return"connection"in navigator&&!0===navigator.connection.saveData}},{key:"supportsLinkPrefetch",value:function(){var elem=document.createElement("link");return elem.relList&&elem.relList.supports&&elem.relList.supports("prefetch")&&window.IntersectionObserver&&"isIntersecting"in IntersectionObserverEntry.prototype}},{key:"isSlowConnection",value:function(){return"connection"in navigator&&"effectiveType"in navigator.connection&&("2g"===navigator.connection.effectiveType||"slow-2g"===navigator.connection.effectiveType)}}]),MdBrowserCompatibilityChecker}();</script> <script type="text/javascript" id="rocket-delay-js-js-after">(function() {"use strict";var e=function(){function n(e,t){for(var r=0;r<t.length;r++){var n=t[r];n.enumerable=n.enumerable||!1,n.configurable=!0,"value"in n&&(n.writable=!0),Object.defineProperty(e,n.key,n)}}return function(e,t,r){return t&&n(e.prototype,t),r&&n(e,r),e}}();function n(e,t){if(!(e instanceof t))throw new TypeError("Cannot call a class as a function")}var t=function(){function r(e,t){n(this,r),this.attrName="data-mdlazyloadscript",this.browser=t,this.options=this.browser.options,this.triggerEvents=e,this.userEventListener=this.triggerListener.bind(this)}return e(r,[{key:"init",value:function(){this._addEventListener(this)}},{key:"reset",value:function(){this._removeEventListener(this)}},{key:"_addEventListener",value:function(t){this.triggerEvents.forEach(function(e){return window.addEventListener(e,t.userEventListener,t.options)})}},{key:"_removeEventListener",value:function(t){this.triggerEvents.forEach(function(e){return window.removeEventListener(e,t.userEventListener,t.options)})}},{key:"_loadScriptSrc",value:function(){var r=this,e=document.querySelectorAll("script["+this.attrName+"]");0!==e.length&&Array.prototype.slice.call(e).forEach(function(e){var t=e.getAttribute(r.attrName);e.setAttribute("src",t),e.removeAttribute(r.attrName)}),this.reset()}},{key:"triggerListener",value:function(){this._loadScriptSrc(),this._removeEventListener(this)}}],[{key:"run",value:function(){MdBrowserCompatibilityChecker&&new r(["keydown","mouseover","touchmove","touchstart"],new MdBrowserCompatibilityChecker({passive:!0})).init()}}]),r}();t.run();}());</script> <script> document.addEventListener("DOMContentLoaded",function(){let lazyFrames=document.querySelectorAll("iframe[data-src]");if("IntersectionObserver" in window){let lazyFrameObserver=new IntersectionObserver(function(entries,observer){entries.forEach(function(entry){if(entry.isIntersecting){let lazyFrame=entry.target;lazyFrame.src=lazyFrame.dataset.src;lazyFrameObserver.unobserve(lazyFrame)}})});lazyFrames.forEach(function(lazyFrame){lazyFrameObserver.observe(lazyFrame)})}else{lazyFrames.forEach(function(lazyFrame){lazyFrame.src=lazyFrame.dataset.src})}}) </script> <style id='wp-block-paragraph-inline-css'> .is-small-text{font-size:.875em}.is-regular-text{font-size:1em}.is-large-text{font-size:2.25em}.is-larger-text{font-size:3em}.has-drop-cap:not(:focus):first-letter{float:left;font-size:8.4em;font-style:normal;font-weight:100;line-height:.68;margin:.05em .1em 0 0;text-transform:uppercase}body.rtl .has-drop-cap:not(:focus):first-letter{float:none;margin-left:.1em}p.has-drop-cap.has-background{overflow:hidden}p.has-background{padding:1.25em 2.375em}:where(p.has-text-color:not(.has-link-color)) a{color:inherit}p.has-text-align-left[style*="writing-mode:vertical-lr"],p.has-text-align-right[style*="writing-mode:vertical-rl"]{rotate:180deg} </style> <style id='malware-bytes-menu-links-style-inline-css'> .menu-links .menu-links__title,.menu-links h2{color:#0d3ecc;font-size:18px;line-height:26px;font-weight:500;margin-top:0;word-wrap:normal;word-break:normal}.menu-links .menu-links__title a,.menu-links h2 a{text-decoration:none}.menu-links .menu-links__subtitle,.menu-links h3{font-size:16px;line-height:20px;color:#082882;margin:0 0 10px;font-weight:500;letter-spacing:.2px}.menu-links ul{margin:0;padding:0;list-style-type:none}.menu-links ul li{font-weight:400;font-size:15.75px;color:#191919;margin:15px 0}.menu-links ul li img{vertical-align:middle;margin:0 3px}.menu-links ul li a{color:#191919}.menu-links ul li a:hover{color:#0d3ecc;font-weight:600;letter-spacing:-0.25px}.menu-links .menu-links__desc{margin:0 0 5px;font-size:15.25px;line-height:20px;color:#082882}.menu-links .menu-links__desc a{text-decoration:none}.menu-links .menu-links__desc img{vertical-align:middle;margin:0 3px}.menu-links.layout-2 .menu-links__desc a{font-weight:500}.menu-links .menu-links__cta a{padding-right:44px;color:#0d3ecc;font-weight:500;font-size:18px;transition:.25s ease-in-out;background:rgba(0,0,0,0) url(data:image/svg+xml;base64,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) right 6px center no-repeat;background-size:30px;font-family:"Graphik","Helvetica Neue","Helvetica","Arial",sans-serif;text-decoration:none}.menu-links .menu-links__cta a:hover{background-position:right 0 center}.menu-links.has-item-border .menu-links__item:not(:first-child){margin:10px 0 0;padding:10px 0 0;border-top:1px solid #d3d9e9}.menu-links.has-item-border .menu-links__item .menu-links__title+.menu-links__cta{margin-top:32px}.menu-links.layout-1.has-item-border .menu-links__item:not(:first-child){margin:20px 0 0;padding:20px 0 0}.menu-links.layout-2.has-item-border .menu-links__item:not(:first-child){margin:20px 0 0;padding:20px 0 0}.menu-links.layout-3 .menu-links__item:not(:first-child){margin:20px 0 0;padding:20px 0 0}.menu-links.layout-3.has-item-border .menu-links__item:not(:first-child){margin:25px 0 0;padding:25px 0 0}.menu-links.with-svg .menu-links__item{margin:20px 0 0;padding:20px 0 20px;border-top:1px solid #d3d9e9}.menu-links.with-svg .menu-links__desc a{font-weight:500}.menu-links.with-svg .menu-links__desc a svg{vertical-align:middle;margin:0 3px}@media (max-width: 1149px){.menu-links .menu-links__title,.menu-links h2{font-size:18px}} </style> <style id='wp-block-group-inline-css'> .wp-block-group{box-sizing:border-box} </style> <style id='wp-block-group-theme-inline-css'> :where(.wp-block-group.has-background){padding:1.25em 2.375em} </style> <style id='wp-block-columns-inline-css'> .wp-block-columns{align-items:normal!important;box-sizing:border-box;display:flex;flex-wrap:wrap!important}@media (min-width:782px){.wp-block-columns{flex-wrap:nowrap!important}}.wp-block-columns.are-vertically-aligned-top{align-items:flex-start}.wp-block-columns.are-vertically-aligned-center{align-items:center}.wp-block-columns.are-vertically-aligned-bottom{align-items:flex-end}@media (max-width:781px){.wp-block-columns:not(.is-not-stacked-on-mobile)>.wp-block-column{flex-basis:100%!important}}@media (min-width:782px){.wp-block-columns:not(.is-not-stacked-on-mobile)>.wp-block-column{flex-basis:0;flex-grow:1}.wp-block-columns:not(.is-not-stacked-on-mobile)>.wp-block-column[style*=flex-basis]{flex-grow:0}}.wp-block-columns.is-not-stacked-on-mobile{flex-wrap:nowrap!important}.wp-block-columns.is-not-stacked-on-mobile>.wp-block-column{flex-basis:0;flex-grow:1}.wp-block-columns.is-not-stacked-on-mobile>.wp-block-column[style*=flex-basis]{flex-grow:0}:where(.wp-block-columns){margin-bottom:1.75em}:where(.wp-block-columns.has-background){padding:1.25em 2.375em}.wp-block-column{flex-grow:1;min-width:0;overflow-wrap:break-word;word-break:break-word}.wp-block-column.is-vertically-aligned-top{align-self:flex-start}.wp-block-column.is-vertically-aligned-center{align-self:center}.wp-block-column.is-vertically-aligned-bottom{align-self:flex-end}.wp-block-column.is-vertically-aligned-stretch{align-self:stretch}.wp-block-column.is-vertically-aligned-bottom,.wp-block-column.is-vertically-aligned-center,.wp-block-column.is-vertically-aligned-top{width:100%} </style> <style id='global-styles-inline-css'> body{--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--color--blue: #0D3ECC;--wp--preset--color--navy-blue: #1C284C;--wp--preset--color--secondary-black: #191919;--wp--preset--color--dark-blue: #082882;--wp--preset--color--sky-blue: #009DEB;--wp--preset--color--baby-blue: #8DCFFD;--wp--preset--color--yellow: #EFC148;--wp--preset--color--pink: #E74488;--wp--preset--color--ruby: #A02A5C;--wp--preset--color--charcoal: #3D3D3D;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}body { margin: 0;--wp--style--global--content-size: 1200px;--wp--style--global--wide-size: 1200px; }.wp-site-blocks { padding-top: var(--wp--style--root--padding-top); padding-bottom: var(--wp--style--root--padding-bottom); }.has-global-padding { padding-right: var(--wp--style--root--padding-right); padding-left: var(--wp--style--root--padding-left); }.has-global-padding :where(.has-global-padding:not(.wp-block-block)) { padding-right: 0; padding-left: 0; }.has-global-padding > .alignfull { margin-right: calc(var(--wp--style--root--padding-right) * -1); margin-left: calc(var(--wp--style--root--padding-left) * -1); }.has-global-padding :where(.has-global-padding:not(.wp-block-block)) > .alignfull { margin-right: 0; margin-left: 0; }.has-global-padding > .alignfull:where(:not(.has-global-padding):not(.is-layout-flex):not(.is-layout-grid)) > :where([class*="wp-block-"]:not(.alignfull):not([class*="__"]),p,h1,h2,h3,h4,h5,h6,ul,ol) { padding-right: var(--wp--style--root--padding-right); padding-left: var(--wp--style--root--padding-left); }.has-global-padding :where(.has-global-padding) > .alignfull:where(:not(.has-global-padding)) > :where([class*="wp-block-"]:not(.alignfull):not([class*="__"]),p,h1,h2,h3,h4,h5,h6,ul,ol) { padding-right: 0; padding-left: 0; }.wp-site-blocks > .alignleft { float: left; margin-right: 2em; }.wp-site-blocks > .alignright { float: right; margin-left: 2em; }.wp-site-blocks > .aligncenter { justify-content: center; margin-left: auto; margin-right: auto; }:where(.wp-site-blocks) > * { margin-block-start: 24px; margin-block-end: 0; }:where(.wp-site-blocks) > :first-child:first-child { margin-block-start: 0; }:where(.wp-site-blocks) > :last-child:last-child { margin-block-end: 0; }body { --wp--style--block-gap: 24px; }:where(body .is-layout-flow) > :first-child:first-child{margin-block-start: 0;}:where(body .is-layout-flow) > :last-child:last-child{margin-block-end: 0;}:where(body .is-layout-flow) > *{margin-block-start: 24px;margin-block-end: 0;}:where(body .is-layout-constrained) > :first-child:first-child{margin-block-start: 0;}:where(body .is-layout-constrained) > :last-child:last-child{margin-block-end: 0;}:where(body .is-layout-constrained) > *{margin-block-start: 24px;margin-block-end: 0;}:where(body .is-layout-flex) {gap: 24px;}:where(body .is-layout-grid) {gap: 24px;}body .is-layout-flow > .alignleft{float: left;margin-inline-start: 0;margin-inline-end: 2em;}body .is-layout-flow > .alignright{float: right;margin-inline-start: 2em;margin-inline-end: 0;}body .is-layout-flow > .aligncenter{margin-left: auto !important;margin-right: auto !important;}body .is-layout-constrained > .alignleft{float: left;margin-inline-start: 0;margin-inline-end: 2em;}body .is-layout-constrained > .alignright{float: right;margin-inline-start: 2em;margin-inline-end: 0;}body .is-layout-constrained > .aligncenter{margin-left: auto !important;margin-right: auto !important;}body .is-layout-constrained > :where(:not(.alignleft):not(.alignright):not(.alignfull)){max-width: var(--wp--style--global--content-size);margin-left: auto !important;margin-right: auto !important;}body .is-layout-constrained > .alignwide{max-width: var(--wp--style--global--wide-size);}body .is-layout-flex{display: flex;}body .is-layout-flex{flex-wrap: wrap;align-items: center;}body .is-layout-flex > *{margin: 0;}body .is-layout-grid{display: grid;}body .is-layout-grid > *{margin: 0;}body{--wp--style--root--padding-top: 0px;--wp--style--root--padding-right: 0px;--wp--style--root--padding-bottom: 0px;--wp--style--root--padding-left: 0px;}a:where(:not(.wp-element-button)){text-decoration: underline;}.wp-element-button, .wp-block-button__link{background-color: #32373c;border-width: 0;color: #fff;font-family: inherit;font-size: inherit;line-height: inherit;padding: calc(0.667em + 2px) calc(1.333em + 2px);text-decoration: none;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-blue-color{color: var(--wp--preset--color--blue) !important;}.has-navy-blue-color{color: var(--wp--preset--color--navy-blue) !important;}.has-secondary-black-color{color: var(--wp--preset--color--secondary-black) !important;}.has-dark-blue-color{color: var(--wp--preset--color--dark-blue) !important;}.has-sky-blue-color{color: var(--wp--preset--color--sky-blue) !important;}.has-baby-blue-color{color: var(--wp--preset--color--baby-blue) !important;}.has-yellow-color{color: var(--wp--preset--color--yellow) !important;}.has-pink-color{color: var(--wp--preset--color--pink) !important;}.has-ruby-color{color: var(--wp--preset--color--ruby) !important;}.has-charcoal-color{color: var(--wp--preset--color--charcoal) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-blue-background-color{background-color: var(--wp--preset--color--blue) !important;}.has-navy-blue-background-color{background-color: var(--wp--preset--color--navy-blue) !important;}.has-secondary-black-background-color{background-color: var(--wp--preset--color--secondary-black) !important;}.has-dark-blue-background-color{background-color: var(--wp--preset--color--dark-blue) !important;}.has-sky-blue-background-color{background-color: var(--wp--preset--color--sky-blue) !important;}.has-baby-blue-background-color{background-color: var(--wp--preset--color--baby-blue) !important;}.has-yellow-background-color{background-color: var(--wp--preset--color--yellow) !important;}.has-pink-background-color{background-color: var(--wp--preset--color--pink) !important;}.has-ruby-background-color{background-color: var(--wp--preset--color--ruby) !important;}.has-charcoal-background-color{background-color: var(--wp--preset--color--charcoal) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-blue-border-color{border-color: var(--wp--preset--color--blue) !important;}.has-navy-blue-border-color{border-color: var(--wp--preset--color--navy-blue) !important;}.has-secondary-black-border-color{border-color: var(--wp--preset--color--secondary-black) !important;}.has-dark-blue-border-color{border-color: var(--wp--preset--color--dark-blue) !important;}.has-sky-blue-border-color{border-color: var(--wp--preset--color--sky-blue) !important;}.has-baby-blue-border-color{border-color: var(--wp--preset--color--baby-blue) !important;}.has-yellow-border-color{border-color: var(--wp--preset--color--yellow) !important;}.has-pink-border-color{border-color: var(--wp--preset--color--pink) !important;}.has-ruby-border-color{border-color: var(--wp--preset--color--ruby) !important;}.has-charcoal-border-color{border-color: var(--wp--preset--color--charcoal) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} </style> <style id='core-block-supports-inline-css'> .wp-container-core-group-is-layout-1.wp-container-core-group-is-layout-1{flex-direction:column;align-items:stretch;}.wp-container-core-group-is-layout-2.wp-container-core-group-is-layout-2{flex-direction:column;align-items:stretch;}.wp-container-core-group-is-layout-3.wp-container-core-group-is-layout-3{flex-direction:column;align-items:stretch;}.wp-container-core-columns-is-layout-1.wp-container-core-columns-is-layout-1{flex-wrap:nowrap;}.wp-container-core-columns-is-layout-2.wp-container-core-columns-is-layout-2{flex-wrap:nowrap;}.wp-container-core-columns-is-layout-3.wp-container-core-columns-is-layout-3{flex-wrap:nowrap;}.wp-container-core-columns-is-layout-4.wp-container-core-columns-is-layout-4{flex-wrap:nowrap;}.wp-container-core-columns-is-layout-5.wp-container-core-columns-is-layout-5{flex-wrap:nowrap;}.wp-container-core-columns-is-layout-6.wp-container-core-columns-is-layout-6{flex-wrap:nowrap;} </style> <script src="https://www.malwarebytes.com/wp-includes/js/jquery/jquery.min.js?ver=1.0" id="jquery-js"></script> <script id="geot-js-js-extra"> var geot = {"ajax_url":"https:\/\/www.malwarebytes.com\/wp-admin\/admin-ajax.php","ajax":"","pid":"515","is_archive":"","is_search":"","is_singular":"1","is_front_page":"","is_category":"","is_page":"1","is_single":"","disable_remove_on_singular":"1","is_builder":"","has_geo_posts":"1","dropdown_search":"","dropdown_redirect":"","elementor_popup":"1","hide_class":"","hide_override_class":"","remove_class":"","remove_override_class":"","disable_console":"","geoloc_enable":"by_ip","geoloc_force":"","geoloc_fail":"Geolocation is not supported by this browser","geot_cookies_duration":"999"}; </script> <script id="main-js-js-extra"> var siteConfig = {"ajaxUrl":"https:\/\/www.malwarebytes.com\/wp-admin\/admin-ajax.php","ajax_nonce":"2c2c40d49f","pwnedAPI":"https:\/\/www.malwarebytes.com\/wp-json\/wp\/v2\/api\/aws\/have-i-been-pwned\/","eventAPI":"https:\/\/www.malwarebytes.com\/wp-json\/wp\/v2\/api\/analytics\/event\/","newsletterAPI":"https:\/\/www.malwarebytes.com\/wp-json\/wp\/v2\/api\/iterable\/newsletter\/","newsletterSuccess":"https:\/\/www.malwarebytes.com\/en\/thank_you\/","newsletterError":"https:\/\/www.malwarebytes.com\/en\/newsletter_error\/","homeURL":"https:\/\/www.malwarebytes.com","request":"glossary"}; </script> <script type="text/javascript" src="https://www.malwarebytes.com/_static/??-eJyVjE0OAiEMRi/kTB0Tgy6MZwFssKR0yLSE6OklujHuXL7v50GvU1zFUAwqt0SikHA1vyU0ktQr1BaYIuSvYvpkc9Yd/CMoJKDIGI2eOA/6NdgdC46d5+43DA8b4FXRFEIjvo3mfbqWy+IObjmf9u6YX1l0Sdo=" defer></script><script defer src="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/main-vwo-personalization-threatdown.js?ver=1.4" id="vwo-personalization-threatdown-js"></script> <script type="text/javascript" src="https://www.malwarebytes.com/_static/??-eJyVjFEOgjAMQC/kbAgS9cN4ljIqdmwtWUsInt5dgc+XvPdgX0NUcRIH/1Ihg4J5x0rj4Q3QjNzAaoRkQFFLoRoJNufMzs2IqgvTNdkFTr1WqqaCmX/orNLUupCzzCFiWZFnsRPTceM8wacShUl3yYpTq9/l1d377tYPw/OR/jNPWUc=" defer></script><script defer src="https://stats.wp.com/e-202447.js" id="jetpack-stats-js" data-wp-strategy="defer"></script> <script id="jetpack-stats-js-after"> _stq = window._stq || []; _stq.push([ "view", JSON.parse("{\"v\":\"ext\",\"blog\":\"227197325\",\"post\":\"515\",\"tz\":\"-8\",\"srv\":\"www.malwarebytes.com\",\"hp\":\"vip\",\"j\":\"1:13.9.1\"}") ]); _stq.push([ "clickTrackerInit", "227197325", "515" ]); </script> <script type="text/javascript" src="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/blocks/glossary/view.js?m=1727198075g" ></script> <script type="text/javascript" id="flying-scripts">const loadScriptsTimer = setTimeout(loadScripts,5* 1000 ) ;const userInteractionEvents = ["mouseover", "keydown", "touchstart", "touchmove", "wheel"]; userInteractionEvents.forEach(function (event) { window.addEventListener(event, triggerScriptLoader, {passive: !0}) }); function triggerScriptLoader() { loadScripts(); clearTimeout(loadScriptsTimer); userInteractionEvents.forEach(function (event) { window.removeEventListener(event, triggerScriptLoader, {passive: !0}) }) } function loadScripts() { document.querySelectorAll("script[data-type='lazy']").forEach(function (elem) { elem.setAttribute("src", elem.getAttribute("data-src")) }) }</script> <!--Weglot 4.2.9--><aside data-wg-notranslate="" class="country-selector weglot-dropdown close_outside_click closed weglot-default wg-" tabindex="0" aria-expanded="false" aria-label="Language selected: English"><ul role="none"></ul></aside> <script type="text/javascript">window.NREUM||(NREUM={});NREUM.info={"beacon":"bam.nr-data.net","licenseKey":"NRJS-51878192dd15f231213","applicationID":"732197726","transactionName":"ZgNQMkpUVkYDBRVQXF9JcwVMXFdbTRYAXlY=","queueTime":0,"applicationTime":653,"atts":"SkRHRAJORRlAB0MDSEwb","errorBeacon":"bam.nr-data.net","agent":""}</script></body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10