Home Malware and exploit terms

196 terms

Malware and exploit terms

Malware and exploit terms describe threats such as malicious software and vulnerability exploitation techniques. Malicious actors may use these techniques to compromise system integrity, confidentiality, and availability.

Potentially unwanted search engine

A potentially unwanted search engine (PUSE) is a program that alters a user's web browser settings without explicit consent, often redirecting their searches to unwanted sites or displaying excessive advertisements.

NXDOMAIN attack

NXDOMAIN attack is a type of Distributed Denial of Service (DDoS) attack that floods a DNS server with requests for domains that don’t exist.

Volumetric attack

Volumetric attack, also known as volumetric DDoS attack, is a type of Distributed Denial of Service (DDoS) attack that uses massive volumes of traffic to attack the target’s network and overwhelm its server resources, effectively making it unavailable to users.

Choke worm

The choke worm was a type of malware from 2001 that spread through MSN Messenger.

Browser modifier

A browser modifier is a type of software that changes how your web browser behaves or appears, often without your permission.

Pulsing zombie attack

During a pulsing zombie attack, compromised devices, called "zombies," send bursts of malicious traffic to a target, causing disruption and evading detection.

Asymmetric Cyberattack

An asymmetric cyberattack is when a small group of attackers or an individual hacker uses technology to cause serious damage to a larger, more powerful organization.

The importance of malware and exploit terminology

Understanding the malware and exploit terminology helps you recognize, respond to, and prevent cyber threats before they can wreak havoc on online systems.

Know what to do

Learning the difference between a trojan and a worm can help you better understand how to combat these and malware and exploit threats.

Learn how cyber threat prevention works

Along with cyber threat terminology, the glossary provides steps to safeguard against the most common malware and exploit techniques.

Notice the threats before they occur

Understanding how malware and exploit works will help you spot potential cyber threats before they can cause harm.

Two women learning cybersecurity terminology.

Online security starts with a click.

Stay safe with the world’s leading VPN

Can’t find an answer to your question?

Ask the questions that matter to you — and get answers from our cybersecurity experts.