For Business
Resources
Guardio Labs
In-Depth Research of Cyber Scams
Blog
Tips & Articles on Online Security
Why Guardio?
Proactive Ways to Fight Cyber Threats
Support
Help Center
Guides and Info for Using Guardio
Contact us
Get Fast, Real-Human Support
Pricing
CyberSecurity, Explained
Cybersecurity should be easy to understand and accessible to everyone. That's why we created this dictionary highlighting the terms you need to know, in plain English.
Must Know:
Account Takeover
Advanced Persistent Threat (APT)
Adware
Anonymizing proxy
Antispyware
Antivirus
Authentication
Autorun worm
Backdoor Trojan
Blacklist
Block Page
Bluetooth
Boot Sector Malware
Botnet
Browser
Browser Hijacker
Browser Protection
Browsing Activity
Brute Force Attack
Bug
CVE (Common Vulnerabilities and Exposures)
Catfishing
Clickbait / Clickjacking
Cloud
Command and Control Center
Compromised
Cookie
Cracking
Credential Theft
Cybersecurity
DDoS
DNs Hijacking
Dark Web
Data Breach
Data Theft
Database
Denial-of-service attack
Different types of hackers
Domain
Download
Drive-by downloads
Easter Egg
Encryption
Exploit
Extension
FTP (File Transfer Protocol)
Fingerprint
Firewall
GDPR General Data Protection Regulation
Gateway Security
Ghosting Scams
Guardio
HTTPS
Hashing
Hoax
Honeypot
IP Address
IPsec
ISP (Internet Service Provider)
Identity Theft
Incident Handling
Infostealers
Internet Worm
JBOH attack
Juice Jacking
Kaptoxa
Klez
Knowledge-Based Authentication
Kraken
Lawful Interception
Link Jacking
Live Capture
Logic Bomb
Malicious Code
Malicious Links
Malvertising
Malware
Man-In-The-Middle Attack
Masquerade Attack
Mobile Phone Malware
National Computer Security Center (NCSC)
National Security Agency (NSA)
Network
Network Sniffing
Network Vulnerability Scanning
Nimda
Online Scams
Open Source Code
Open Source Hardening Project
Operating System
Over-the-air attack
Packet
Parasitic Viruses
Patch
Payment Card Skimmer
Pharming
Phishing
Pig Butchering Scams
Pop up blocker
Potentially Unwanted Application (PUA)
Pretexting
Push Notifications (web
Quarantining
Ransomware
Remote Access Scams
Restore
Reverse Engineering
Rootkit
SQL Injection?
SSL Certificate
Scareware
Search Hijacking
Smishing
Social Engineering
Social Networking
Software
Spam: What is it and How is it Harmful?
Spoofing
Spyware
Tech Support Scam
Threat
Trojan
URL (Uniform resource locator)
URL or Web Content Filtering
Unauthorized access
VPN (Virtual Private Network)
Virus
Vishing
VoIP
WiFi
Wiretapping
Worm
XSS
Xafecopy
Yahoo Search Virus
YubiKey
Zero-day attack
Zero-day vulnerability
Zeus Game Over
Zip Bomb
Zombie Computer