C 
 
Cyberterrorism
ChatGPT said: Cyberterrorism What it is Cyberterrorism is using computers and the internet to frighten, disrupt, or harm people and organizations—at scale. Instead of bombs or break-ins, attackers use hacks, fake messages, and takedowns to shut ...
 
Cybersecurity
What it is Cybersecurity is how we protect our digital stuff—accounts, devices, and data—from snooping, tampering, or destruction. Think of it like locks, cameras, and guards for your online life. For a detailed overview, see our cybersecurity guide ...
 
Cybercriminal
What it is A cybercriminal is someone who commits crimes using computers or the internet—either as the weapon, the target, or both. Think data theft, online scams, and break-ins that happen through screens instead of doors. What they do (common ...
 
CTB Locker
What it is CTB Locker is crypto-ransomware first seen in 2014. Once it lands, it encrypts your files and drops a note demanding payment to unlock them. It often hits Windows PCs through convincing lures and fake updates. How it spreads Phishing ...
 
Crysis (Dharma)
What it is Crysis (also known as Dharma) is ransomware that sneaks in through exposed or weak Remote Desktop Protocol (RDP) access, then encrypts documents, photos, and databases and asks for a ransom to unlock them. Active since 2016, it’s still ...
 
Crypto Malware (Cryptojacking)
What it is Cryptojacking is sneaky malware that hijacks your CPU/GPU to mine cryptocurrency for someone else. You pay the price—slowdowns, heat, battery drain—while the attacker collects the coins. What you may notice Fans roaring and the device runs ...
 
Cryptovirology
What it is Cryptovirology is the study (and misuse) of cryptography for attacks. Instead of protecting data, it uses strong encryption and crypto tricks to power malware—most famously ransomware that locks files with keys victims can’t guess or ...
 
CryptoLocker Ransomware
What it is CryptoLocker is ransomware that breaks into a Windows PC, hunts for documents (on the computer and connected drives), encrypts them with strong keys, and then demands a payment to unlock your files. You’ll see a ransom note saying your ...
 
Cryptocurrency
What it is Cryptocurrency is internet-native money. People send it directly to each other - no bank in the middle - using a public ledger called a blockchain. Payments live as digital records, and your coins are controlled by your wallet (really: ...
 
CryptBot
What it is CryptBot is a Windows info-stealer. It sneaks onto a PC, hunts for browser passwords, cookies, payment info, and crypto wallets, zips it all up, and sends it to criminals. From there, your logins can be sold or used for account takeovers. ...
 
Crimeware
Crimeware is an umbrella term for malware used to make money: ransomware, banking trojans, password stealers, botnets, spyware, and more. You’ll hear “malware” more often - same crowd, different label. Why it matters Crimeware aims for cash and data. ...
 
Crack
What it is A crack (software crack) is a tweak to a program’s files that turns off license checks—so paid software runs without a valid key. It’s part of software piracy. Why it’s risky Cracks often come bundled with malware (stealers, backdoors, ...
 
Conversation Interception
What it is Conversation interception is when attackers sneak into an email thread—by hacking a mailbox or buying stolen archives—and quietly read along. Once they know the context, they can impersonate one side (e.g., a supplier or buyer) to reroute ...
 
Container Breakout
What it is A container breakout is when an attacker escapes a container (e.g., a Docker/Kubernetes pod) and reaches the host OS. From there, they can read sensitive files, tamper with other containers, or run malware with host-level access. (Escaping ...
 
Conduit
What it is Conduit is a browser hijacker for Windows and Mac. It takes over your browser - swapping your homepage/search, adding a pushy toolbar, and sending you to sites you didn’t ask for. Details and examples: Conduit threat guide What you may ...
 
Computer Virus
What it is A computer virus is malware that copies itself into other files and programs—so every infected file can spread the infection again. That’s why outbreaks snowball. Viruses can slow your PC, break apps, or hide other threats. See our ...
 
Computer Network Attack
What it is A computer network attack is a deliberate hit on your systems to break, slow, or quietly take control. Attackers exploit weak spots in apps, devices, or configurations to spread malware, steal data, or flood services with traffic (DDoS) ...
 
Command and Control (C2) Server
What it is A Command and Control (C2) server is the headquarters for malware. Once devices are infected, they “phone home” to this server for orders—attack a target, download more malware, steal data, or even self-destruct. Overview: C2 servers ...
 
CoinMiner
What it is CoinMiner is malware that hijacks your computer’s CPU/GPU to mine cryptocurrency for someone else. You get slowdowns, heat, and bigger power bills; they get the coins. See common signs and fixes in our CoinMiner guide What you may notice ...
 
Code Injection
What it is Code injection (often leading to remote code execution) is when attackers feed a program the kind of input it never expected—so it runs the attacker’s code instead of safe instructions. That “code” can be a script or DLL dropped after the ...
 
Cobalt Strike Beacon
What it is Cobalt Strike Beacon is a powerful remote-control implant used after a break-in. It was built for red-team testing, but criminals use it too. Once running, Beacon “checks in” to a command server, lets attackers run commands, move sideways, ...
 
Clop Ransomware
What it is Clop is big-game ransomware: attackers break into a network, encrypt files, and demand payment to unlock them—often with data theft first to pressure victims (double extortion). It mostly targets Windows environments and larger ...
 
Clickjacking
What it is Clickjacking (also called UI redress) is a web page magic trick. A fake button or invisible layer is placed on top of the real page so you think you’re liking a post, closing a popup, or playing a video—when you’re actually clicking ...
 
Chargeware
What it is Chargeware is a sneaky mobile app that looks legit—even works as advertised—but secretly signs you up for paid services and bills your phone number or card. Think weather app or cleaner with a side job: quiet subscriptions and premium SMS ...
 
Cerber Ransomware
What it is Cerber is ransomware run like a business (“RaaS”). The operators rent the malware to affiliates, who break in, encrypt files, and demand payment—then share the profits with Cerber’s creators. How it spreads Phishing emails with ...
 
CDR (Content Disarm and Reconstruction)
What it is CDR is a “clean-and-rebuild” filter for files. Instead of trying to guess if a document is bad, it strips out risky pieces (macros, hidden scripts, odd objects), then reconstructs a safe, working copy for you to open. For a deep dive, see ...
 
CDN SSL/TLS Security
What it is CDN SSL/TLS security wraps your website traffic in encryption at the CDN edge and all the way back to your origin. The CDN sits between visitors and your servers; done right, it stops eavesdropping, tampering, and spoofed look-alike pages ...
 
Carberp
What it is (in plain words): Carberp is a sneaky banking trojan—malware that slips onto your PC, watches what you type, and tries to steal money-related data. It targets things like online banking logins, card details, and one-time codes, often ...
 
Cactus Ransomware
What it is (in plain words): Cactus sneaks into company networks through weak or outdated VPN setups, then locks (encrypts) files and demands money to unlock them. It’s a break-in via remote access, followed by a warehouse of locked boxes. How it ...