B 
 
Brute Force Attack
What it is A brute force attack is password guessing on turbo. An attacker tries lots of combinations - sometimes millions - until one works. It’s not clever, just relentless, and it targets anything with a login or key: email, Wi-Fi, cloud apps, ...
 
Browser Isolation
What it is Browser isolation puts your web activity in a safe bubble—a sandbox or remote container—so risky pages can’t touch your actual device. You browse normally; anything malicious stays trapped on the other side. Why it matters Most attacks ...
 
Browser Hijacker
What it is A browser hijacker is unwanted software that takes over your browser—changing your homepage or search, adding noisy extensions, and shoving extra ads and redirects into every click. It treats Chrome, Edge, Firefox, Safari, and others like ...
 
Botnet
What it is A botnet is a remote-controlled crowd of infected devices - PCs, phones, routers, even cameras - all taking orders from a command server. Criminals use these “bots” for spam blasts, DDoS attacks, credential stuffing, malware drops, click ...
 
Bootkit
What it is A bootkit is stealthy malware that buries itself in the startup area of a PC (MBR/UEFI), so it runs before Windows. That early start lets it hide other malware, survive reboots, and dodge many on-device scans. What you may notice Odd boot ...
 
Bluebugging
What it is Bluebugging is a Bluetooth break-in. An attacker sneaks onto a phone or laptop through a weak or misconfigured Bluetooth connection, then takes control features meant for headsets or car kits—calls, messages, contacts, even mic access. ...
 
Blended Threat
What it is A blended threat mixes several attack tricks at once—think phishing email + exploit link + worm-style spread—so one weak spot opens the door for the rest. It’s a combo hit designed to move fast, hide well, and do more damage than any ...
 
Beaconing
What it is Beaconing is the quiet “check-in” a hidden infection makes to its boss (a command-and-control server). The malware pings out on a schedule to say “I’m here,” ask for instructions, or send stolen data like logins or card details. It can ...
 
BIA (Business Impact Analysis)
What it is A Business Impact Analysis is a simple way to ask, “If something breaks, what hurts first - and how much?” It looks across your day-to-day work (people, apps, vendors, locations) and estimates how an incident would slow you down or cost ...
 
Banker Trojan
What it is A banker trojan is malware built to steal money from online banking. It sneaks onto a PC, watches logins, and can secretly redirect you to fake pages or overlay real ones to grab passwords, 2FA codes, and payment details. It often hides by ...
 
Baiting
What it is Baiting is a social-engineering trick: attackers dangle something tempting—an “urgent” work file, free software, a giveaway—to make you install malware yourself. The lure feels legit; the payload hides in the download. How it works A ...
 
BabLock Ransomware
What it is (in plain words): BabLock is ransomware that breaks into Windows and Linux systems, scrambles (encrypts) your files, and demands payment to unlock them. It typically goes after small and mid-size businesses where one infected PC can ...
 
Backdoor
A backdoor is a hidden way into a device or account. It lets someone bypass normal logins and get in without your knowledge. How it gets there: Malware: a trojan installs secret remote access. Software bugs: attackers exploit a flaw to plant access. ...