Home Fraud Schemes Types of Malware Do's and Don't's If You're a Victim Articles FAQ's Protect Yourself Security Software Online Resources Glossary Get involved Contact us



Adware

Authentication

Blended Threat

Browser

Browser hijacker

bug

Callback

Case-sensitive

Certificate

Certificate authority

Certificate authority-signed SSL

Certificate store

Companion virus

Content filtering

Cookie

CRA

Daemon

Denial-of-service (DoS) attack

Dialers

Distributed denial-of-service (DDoS) attack

Domain Name System (DNS)

Encrypted Virus

Encryption

EULA

Exploit

Exposure

File-infecting virus

Firewall

Fraud

Hack

Hack Tools

Hacker

Hijacking

Hoax

Hyperlink

Instant Messaging (IM)

IP address

IT

Joke Programs

Key logging

Linux operating system

Log

Logon procedures

Macro virus

Malware (Malaware)

Motherboard

Notification

Patch

Personal information

Phishing

Phishing attack

Ping

Polymorphic Virus

Pop-under windows

Pop-up windows

Proxy

Quarantine

Remote Access

Retrovirus

SCAM

Secure Sockets Layer (SSL)

Security architecture

Security life cycle

Security response

Security services

Shareware

Social engineering attack

Spam

Spoof email

Spoof website

Spyware

Spyware

Subject of email

Threat

Trojan Horse

Unix

Variants

Virus

Wake-On-Lan

Windows autostart programs

Worm


 
 

Home :: Internet Fraud Schemes :: Do's and Don't's :: What To Do if You're a Victim :: Articles
Frequently Asked Questions :: Protect Yourself :: Freeware Security Software :: Online Resources :: Glossary :: Get Involved

© 2004 - 2017, Security4Web, Inc.         Disclaimer | Privacy Policy
a service offered by Web4Future.com.