The Glossary contains several hundred definitions of terms that you might come across in our articles and blogs, or on other information security sites. Unlike the in-depth articles in the Knowledge Base, every definition in the Glossary is succinct, while remaining highly informative.
(This section is currently under construction)
In the Knowledge Base, you will find various articles about common threats, a general classification of malware and unwanted messages, and a brief historical overview of the evolution of these and many other threats.
The Knowledge Base now has three main sections:
– The Detectable Objects section gives detailed information about malicious and potentially dangerous programs that we protect users against every single day all around the world, as well as advice on what to do in case of infection.
– In the Spam and Phishing section, you will learn about phishing and spam mailings, how their creators earn money from them, and how this type of threat has evolved since the 1990s to the present day.
– The articles in the Vulnerabilities and Hackers section is devoted to the topic of software vulnerabilities and how cybercriminals exploit them, as well as legislation and hackers in the broad sense of the word.
3G (short for 3rd Generation) is the general term for technologies and standards designed to combine high speed mobile access with IP [Internet Protocol]-based services. 3G has improved the performance of wireless services, delivering greater data speeds and greater capacity… Read Full Article
This is a scam in which a victim is persuaded to part with money on the fraudulent promise of obtaining a larger sum in the future. The scam takes the form of a letter, fax, e-mail, or other communication that… Read Full Article
4G (short for 4th Generation) is the successor to 3G and is seen as the next step towards ubiquitous computing, offering always-on access to Internet-based services — peak data rates of 100Mbps for someone on a highly mobile network and… Read Full Article