E 
 
Executable File
What it is An executable file is a program you can run - double-click it and your operating system starts doing what the file tells it to do. Common examples: .exe and .msi on Windows, apps on macOS, and ELF binaries on Linux. Why it matters ...
 
Exploit Kit
What it is An exploit kit is a malicious toolkit on a booby-trapped or hacked website. When you land there, it quietly checks your browser and plugins for known bugs and, if it finds one, uses it to install malware - ransomware, trojans, keyloggers, ...
 
Exploit
What it is An exploit is code or a technique that takes advantage of a vulnerability to make software do something it shouldn’t—run attacker code, dump data, or bypass security. It’s not the whole attack by itself, but the key that opens the door. ...
 
Evil Maid Attack
What it is An evil maid attack targets an unattended device - think laptop in a hotel room or office desk. An attacker with brief physical access can steal data or plant stealthy changes (even firmware tweaks) that later fake a login prompt to ...
 
Encrypted File Transfer
What it is Encrypted file transfer is sending files in a locked envelope. The contents are scrambled so only someone with the right key or password can read them - keeping your documents safe from snoops on Wi-Fi, the internet, or shared networks. ...
 
Email Attack
What it is An email attack uses your inbox as the doorway. Criminals send messages that trick you or deliver malware - from fake “account alerts” to booby-trapped invoices - aiming to steal logins, install spyware/ransomware, or get you to send ...
 
EDR (Endpoint Detection and Response)
What it is EDR is your always-on security team for laptops and servers. It watches what’s happening on each device, spots attacks in progress, and helps you respond fast - quarantine, investigate, and clean up. For details on capabilities and use ...
 
Early Launch Anti-Malware (ELAM)
What it is Early Launch Anti-Malware (ELAM) is a Windows feature that lets your security software start first during boot. By loading a tiny anti-malware driver before most other drivers, ELAM can block boot-time threats (like rootkits) before they ...