A 
 
AutoKMS
What it is AutoKMS is riskware—tools that try to fake-license Windows or Office. They often tweak system services and security settings to keep the “activation” alive. That shortcut can open bigger problems: malware bundles, blocked updates, and ...
 
Atraps
What it is Atraps is a Windows trojan that slips onto a PC to steal sensitive data (logins, cookies, system info) and may rope the device into the ZeroAccess botnet. For behavior details and examples, see the Atraps threat guide. What you may notice ...
 
AZORult
What it is AZORult is a Windows info-stealer and downloader. It hunts for saved passwords, browser cookies, crypto wallets, and app tokens, then sends them to attackers. It can also pull in more malware after it lands. See details in the AZORult ...
 
Atomic Stealer
What it is Atomic Stealer is macOS malware built to lift your secrets—especially crypto wallets, passwords, and browser data—then send them to attackers. It often looks harmless while it works. See behaviors and examples in the Atomic Stealer threat ...
 
Attack Signature
What it is An attack signature is a fingerprint for known bad behavior. It’s a rule (or pattern) security tools use to spot specific threats—like a malware family, exploit, or command sequence—by matching code, traffic, or behavior seen in past ...
 
Async RAT
What it is Async RAT is a remote-access tool turned spy kit. Once installed, attackers can watch screens, log keystrokes, steal files and passwords, and control the device from afar. For behaviors and examples, see the Async RAT threat guide. What ...
 
APT (Advanced Persistent Threat)
What it is An APT is a long-game, targeted attack. Skilled attackers quietly break in, move sideways through the network, and stay hidden for weeks or months to steal sensitive data—not to make noise. Think careful recon, staged break-ins, and ...
 
Application Allow-listing
What it is Application allow-listing (aka “only these apps may run”) is a safety rule for your devices. You create a small, approved list of programs—and everything else is blocked by default. If it’s not on the list, it doesn’t launch. Why it ...
 
Anti-spyware
What it is Anti-spyware is a security tool that hunts down spyware - stealthy apps that secretly watch what you do, steal logins, or track your browsing. Think of it as the part of your protection stack that catches quiet snoops before they cash in ...
 
Antivirus
What it is An antivirus (AV) is a security app that spots and stops malicious software before it wrecks your day. It can watch in real time, scan on demand, and help undo changes after an attack. For a deeper dive, see our antivirus guide Antivirus ...
 
Amonetize
What it is Amonetize is deceptive adware that pretends to be a harmless PUP. Once in, it floods pages with ads, forces redirects, and quietly harvests data. See behavior details and examples in the Amonetize threat guide What you may notice Extra ...
 
Arkei (ArkeiStealer)
What it is Arkei is a Windows info-stealer: quiet malware that hunts for your saved passwords, browser cookies, and crypto wallets—then sends them to attackers. It often runs silently, so the first clue is trouble elsewhere (sudden login alerts, ...
 
Adware.Gen
What it is Adware.Gen is a catch-all name for adware that sneaks into your browser or system, stuffs pages with extra ads, adds unwanted extensions, and quietly phones home. For details and examples, see the Adware.Gen guide What you may notice Extra ...
 
Adware
What it is Adware is software that hijacks your browsing to push ads you didn’t ask for. It tweaks browser and network settings so more banners, pop-ups, and redirects appear—even on clean sites. For details, see the the Adware Guide To clean it, try ...
 
Address Resolution Protocol (ARP)
What it is ARP is the quick “who’s who” of your local network. When a device knows an IP address (like 192.168.1.10) but not the device’s physical address, ARP asks, “Who has this IP?” and learns the device’s hardware (MAC) address so data can reach ...
 
Address Bar Spoofing
What it is Address bar spoofing is a visual trick: the page makes your browser’s top bar look like you’re on a trusted site when you’re not. Fake URL, real danger—because you’ll feel safe entering logins or payment details. Why it works Pop-ups or ...
 
Address Bar
What it is The address bar is the box at the top of your browser that shows where you are on the web. Type a site name or paste a link there to go somewhere new. If you enter something that isn’t a full address, most browsers treat it like a search. ...
 
Ad Rotator
What it is An ad rotator lets one ad spot “take turns.” Each page view (or refresh) shows a different creative from a set, so the same space can test ideas, share inventory, and feel fresh to visitors. Why use it Keep pages from feeling repetitive ...
 
Ad Fraud
What it is Ad fraud (aka invalid traffic) is when fake views, clicks, or installs make advertisers pay for attention that never came from real people. Think bots, hijacked devices, or shady sites simulating an audience. How it happens Bots & farms: ...
 
Ad Blocker
What it is An ad blocker is a small add-on for your browser that stops most ads and trackers before they load. Result: cleaner pages, fewer pop-ups, faster browsing. Why people use it Less noise: read the page, not the banners. More speed: fewer ...
 
Account Hijacking
What it is (in plain words): Account hijacking is like someone slipping into your online life and wearing your name tag. They post as you, peek at your messages, even lock you out. It often starts small — a fake login page, a weak password — and ...
 
Account Compromise
What it means: Someone who isn’t you gets into your account and can act as you. They might read your messages, change settings, or try to steal money. How it usually happens: Phishing: you’re tricked into typing your password on a fake page. Malware: ...