Learn terminology with our comprehensive glossary. We explain key cybersecurity terms in simple, easy-to-understand language.
Search: Clear
- 3G
- 419 Scam
- 4G
- Abuse
- Access and Resource Management Service
- Active Directory
- AD
- Ad Blocker
- Administrator
- API
- Application Programming Interface
- Bluetooth
- BT
- CA
- Certificate Authorities
- Cloud
- Cloud Computing
- Cloud Services
- Cloud Storage
- Computer Virus
- Crack
- Cracker
- Cybercriminal
- Darknet
- Dark Web
- Deepfake
- Directory Service
- Executable File Packer
- Fourth Generation
- Global Positioning System
- GPS
- Hacker
- HTTP
- HyperText Transfer Protocol
- Infected Computer
- Intruder
- Intrusion Prevention System
- IPS
- JavaScript
- JS
- Malware
- .NET
- Nigerian letter
- Notarization
- Object Linking and Embedding
- OLE
- Packer
- Patch
- Personal Network
- Random Value
- RAT
- RAT Trojan
- Remote Access Trojan
- Salt
- Samba
- Synthesized Media
- Third Generation
- Unique Modifier
- Virtual Private Network
- Virus
- VPN
- Wi-Fi
- Wireless Fidelity
- Wireless Technology
- WLAN
- Zombie
- Zombie Computer