Monday 24 August 2020

The internet has so many different uses, whether it's for work or play. But it can also be dangerous, with cyber criminals constantly looking to launch attacks on unsuspecting victims.

To protect yourself from increasing online threats, downloading one of the best antivirus softwares has a range of benefits. However, If you've researched how this software works and the type of threats that it'll mitigate, you may have seen that here's a lot of confusing jargon out there. We explain the most common antivirus terms.

Top antivirus terms to know

Let's dive right in and take a look at all the top antivirus terms to help make sure you know what everything is.

Adware

Adware is a type of software that is used for showing advertisements on web websites, web browsers, search engines, free applications and even people's devices. Often, adware consists of pop-ups and other intrusive forms of advertising. Generally, these advertisements are not wanted by users and can result in issues such as laggy performance.

Antivirus

The term antivirus is used when describing a type of software application that identifies and mitigates a range of online threats by scanning files and applications on your computer. This is something you add-on after the purchase, and there is a variety of paid and free options, each with a unique benefit.

Blacklist

With a blacklist tool, you're able to list different websites and IP addresses that you want to be blocked on a device or network. Typically, they're used as an internet safety measure by parents to ensure their children can't access adult content (e.g. pornography and gambling websites) online.

Distributed Denial of Service Attack

A Distributed Denial of Service (DDoS) attack is when someone targets a specific server with an abundance of incoming traffic. The idea is to push the resource limit to the max and end up with the website going offline. While this is happening, it's extremely hard to access websites and internet-based services until it's resolved.

Encryption

Encryption is used to protect sensitive data, such as messages, passwords, credit card information and online transactions. It works by turning plaintext into indecipherable numbers. For this data to be then read, a decryption key is necessary.

Firewall

Firewalls are a security mechanism that analyses all the traffic that enters and exits a network. By doing this, firewalls can prevent intruders from breaching network security and subsequently getting into your device. They're a staple part of cyber security and protect users from all kinds of cyber attacks.

IP address

An internet protocol address is given to every device that is connected to the internet. It essentially serves as an identifier for connected devices, whether it's a computer, tablet PC, smartphone, router or smart TV, and is also used to locate where an electronic product is being used.

Malware

Malware is essentially malicious software that has been designed by a threat actor for the sole purpose of breaking into or causing damage to a target's device. Often, the victim won't realise that they've been targeted by malware. Other cybersecurity threats such as viruses, worms, trojans and spyware are all forms of malware but have different purposes and capabilities.

Phishing

Phishing attacks are when a cyber criminal sends a malicious email, message or call and asks users to provide personal information, including logins and credit card information. Crooks conducting these attacks often tell victims that they're getting in touch from a legitimate company, like a bank or retail chain.

Proxy Servers

Proxy servers perform the role of a mediator between internet users and websites. They make it possible for users to access websites and online services through a different IP address. This allows people to circumvent geo restrictions and hide their identity, although proxies don't encrypt your internet traffic like a VPN does.

Ransomware

Ransomware is a form of cyber crime whereby a hacker gains access to a device, steals or encrypts data, and threatens to delete or leak this data online unless a ransom fee is paid. Some threat actors may provide access to an encryption key if the victim agrees to pay a ransom.

Router

A router is a piece of hardware for connecting your devices (computers, tablets, smartphones, etc) to the internet, allowing you to surf the web. If you sign up for a broadband package, you'll be provided with a router by your internet service provider (ISP).

Spyware

Spyware, which is also a form of malware, enables cyber criminals to collect sensitive data such as all the activities that an individual or business conducts online, credit card information and account logins. Perpetrators can then use this information for stealing people's identities, launching further attacks or selling data to advertisers, without victims knowing or giving their permission.

Trojan

Trojans, a subset of malware, masquerade as legitimate websites and applications that can trick users into providing personal information such as logins and credit card numbers. They also enable hackers to conduct other malicious activities, such as gaining remote access to infected computers, spying on users and sending text messages. People can become affected by a Trojan by clicking on links in phishing emails or downloading malicious software.

Whitelist

The opposite to a blacklist is a whitelist. While a blacklist allows users to block specific websites and applications, a whitelist enables them to approve URLs so that they can be accessed on a device or network.

Viruses

Viruses are a form of malware that self-replicate with the aim of infecting an entire device. It can cause extensive damage to a victim's computer, both on an operating system and application-level. Devices can become infected by a virus when a user clicks on a malicious link in an email, opens a malicious document or downloads a malicious application. You can usually tell if you've fallen victim to a virus if your device suddenly becomes slow or performs random actions.

VPN

A Virtual Private Network (VPN) is a piece of software that creates a secure, private network that enables users to browse the internet anonymously. By downloading one of the best VPN applications to your device, you can connect to servers across the world to hide your IP address, bypass geo restrictions and improve your online security.

Worms

Worms are another type of malicious software and, like viruses, are also capable of self-replicating. They usually spread across networks in order to infect different computers and create a backdoor for cyber criminals. A worm often leverages security flaws in computing devices. Victims of a computing worm may experience slower internet speeds.

Zero day

A zero day is a security flaw in a piece of software that has yet to be discovered and addressed by a manufacturer through a software update. Hackers often exploit these in order to breach vulnerable devices. When a hacker exploits a zero-day vulnerability, this is called a zero-day attack.



0 comments:

Post a Comment

ShortNewsWeb

Blog Archive

Categories

'The Woks of Life' Reminded Me to Cook With All the Flavors I Love (1) 13 of the Best Spooky Episodes From (Mostly) Un-Spooky Shows (1) 1Password Now Generates QR Codes to Share Wifi Passwords (1) 2024 (15) 30 Movies and TV Shows That Are Basically 'Competence Porn' (1) 30 of the Most Obscenely Patriotic Movies Ever (1) 31 Spooky Movies to Watch Throughout October (1) 40 Netflix Original Series You Should Watch (1) 55 Box Office Bombs Totally Worth Watching (1) Active Directory (1) Adobe's AI Video Generator Might Be as Good as OpenAI's (1) AIX (1) and Max Bundle Isn't a Terrible Deal (1) Apache (2) Apple Intelligence Is Running Late (1) Apple Intelligence's Instructions Reveal How Apple Is Directing Its New AI (1) August 18 (1) August 4 (1) August 5 (1) Backup & Restore (2) best practices (1) bleepingcomputer (46) Blink Security Cameras Are up to 68% Off Ahead of Prime Day (1) CentOS (1) Configure PowerPath on Solaris (1) Documents (2) Don't Rely on a 'Monte Carlo' Retirement Analysis (1) Eight Cleaning Products TikTok Absolutely Loves (1) Eight of the Best Methods for Studying so You Actually Retain the Information (1) Eight Unexpected Ways a Restaurant Can Mislead You (1) Elevate Your Boring Store-Bought Pretzels With This Simple Seasoning Technique (1) Everything Announced at Apple's iPhone 16 Event (1) file system (6) Find (1) Five Red Flags to Look for in Any Restaurant (1) Flappy Bird's Creator Has Nothing to Do With Its 'Remake' (1) Four Reasons to Walk Out of a Job Interview (1) Four Signs Thieves Are Casing Your House (1) gaming (1) Hackers Now Have Access to 10 Billion Stolen Passwords (1) How I Finally Organized My Closet With a Digital Inventory System (1) How to Cancel Your Amazon Prime Membership After Prime Day Is Over (1) How to Choose the Best Weightlifting Straps for Your Workout (1) How to Keep Squirrels Off Your Bird Feeders (1) How to Set Up Your Bedroom Like a Hotel Room (and Why You Should) (1) How to Take a Screenshot on a Mac (1) How to Take Full Control of Your Notifications on a Chromebook (1) Hulu (1) If You Got a Package You Didn't Order (1) If You Hate Running (1) Important Questions (17) Install and Configure PowerPath (1) interview questions for linux (2) Is ‘Ultra-Processed’ Food Really That Bad for You? (1) Is Amazon Prime Really Worth It? (1) It Might Be a Scam (1) July 14 (1) July 21 (1) July 28 (1) July 7 (1) June 30 (1) LifeHacker (101) Linux (36) Meta Releases Largest Open-Source AI Model Yet (1) Monitoring (3) music (688) My Favorite 14TB Hard Drive Is 25% Off Right Now (1) My Favorite Amazon Deal of the Day: Apple AirPods Max (2) My Favorite Amazon Deal of the Day: Google Nest Mesh WiFi Router (1) My Favorite Amazon Deal of the Day: Google Pixel 8 (1) My Favorite Amazon Deal of the Day: PlayStation 5 (1) My Favorite Amazon Deal of the Day: SHOKZ OpenMove Bone Conduction Headphones (1) My Favorite Tools for Managing Cords and Cables (1) Nagios (2) Newtorking (1) NFS (1) OMG! Ubuntu! (688) Oracle Linux (1) oracleasm (3) osnews (22) Password less communication (1) Patching (2) Poaching Is the Secret to Perfect Corn on the Cob (1) powerpath (1) Prioritize Your To-Do List By Imagining Rocks in a Jar (1) Red Hat Exam (1) register (46) Rsync (1) Safari’s ‘Distraction Control’ Will Help You Banish (Some) Pop Ups (1) Samba (1) Scrcpy (1) September 1 (1) September 15 (1) September 2 (1) September 22 (1) September 23 (1) September 30 (1) September 8 (1) Seven Home 'Upgrades' That Aren’t Worth the Money (1) ssh (1) Swift Shift Is the Window Management Tool Apple Should Have Built (1) System hardening (1) Target’s Answer to Prime Day Starts July 7 (1) Tech (9536) Tech CENTRAL (17) Technical stories (101) technpina (6) The 30 Best Movies of the 2020s so Far (and Where to Watch Them) (1) The 30 Best Sports Movies You Can Stream Right Now (1) The Best Deals on Robot Vacuums for Amazon’s Early Prime Day Sale (2) The Best Deals on Ryobi Tools During Home Depot's Labor Day Sale (1) The Best Early Prime Day Sales on Power Tools (1) The Best Movies and TV Shows to Watch on Netflix This Month (1) The Best Places to Go When You Don't Want to Be Around Kids (1) The Best Strategies for Lowering Your Credit Card Interest Rate (1) The Best Ways to Store All Your Bags and Purses (1) The Latest watchOS Beta Is Breaking Apple Watches (1) The New Disney+ (1) The Two Best Times of Year to Look for a New Job (1) These Meatball Shots Are My Favorite Football Season Snack (1) These Milwaukee Tools Are up to 69% off Right Now (1) This Google Nest Pro Is 30% Off for Prime Day (1) This Peanut Butter Latte Isn’t As Weird As It Sounds (1) This Tech Brand Will Get the Biggest Discounts During Prime Day (1) Three Quick Ways to Shorten a Necklace (1) Today’s Wordle Hints (and Answer) for Monday (4) Today’s Wordle Hints (and Answer) for Sunday (11) Try 'Pile Cleaning' When Your Mess Is Overwhelming (1) Try 'Rucking' (1) Ubuntu News (345) Ubuntu! (1) Unix (1) Use This App to Sync Apple Reminders With Your iPhone Calendar (1) veritas (2) Videos (1) Was ChatGPT Really Starting Conversations With Users? (1) Watch Out for These Red Flags in a Realtor Contract (1) Wayfair Is Having a '72-Hour Closeout' Sale to Compete With Prime Day (1) We Now Know When Google Will Roll Out Android 15 (1) What Is the 'Die With Zero' Movement (and Is It Right for You)? (1) What Not to Do When Training for a Marathon (1) What's New on Prime Video and Freevee in September 2024 (1) Windows (5) You Can Easily Add Words to Your Mac's Dictionary (1) You Can Get 'World War Z' on Sale for $19 Right Now (1) You Can Get a Membership to BJ's for Practically Free Right Now (1) You Can Get Beats Studio Buds+ on Sale for $100 Right Now (1) You Can Get Microsoft Visio 2021 Pro on Sale for $20 Right Now (1) You Can Get This 12-Port USB-C Hub on Sale for $90 Right Now (1) You Can Get This Roomba E5 Robot Vacuum on Sale for $170 Right Now (1) You Can Hire Your Own Personal HR Department (1) You Can Set Different Scrolling Directions for Your Mac’s Mouse and Trackpad (1)

Recent Comments

Popular Posts

Translate

My Blog List

Popular

System Admin Share

Total Pageviews