F 
 
FusionCore
What it is FusionCore is an adware bundler that slips extra components into your PC during installs - toolbars, updaters, browser changes, and other potentially unwanted programs. It rides along with “free” installers and repacks, then nudges ...
 
Floxif (Win32/Floxif)
What it is Floxif is a Windows trojan that tampers with system files to spy on activity and open a backdoor for more malware. It can collect device details, watch what you do, and help attackers install additional payloads. Technical details and IOCs ...
 
Form-Based Authentication
What it is Form-based authentication is the login box you see on most websites. A page asks for your username and password, then the app checks them and signs you in if they match. How it works - quick tour You enter credentials in a web form and ...
 
FormBook
What it is FormBook is spyware for Windows that sneaks onto a PC to steal files and data. It can log what you type, grab passwords and cookies from browsers, and take screenshots, then send everything back to the attacker. Details and IOCs: see our ...
 
Fork Bomb
What it is A fork bomb is a tiny program or command that clones itself over and over until your computer runs out of processes and resources. The system becomes slow or unresponsive - sometimes it crashes - because it’s too busy creating more copies. ...
 
Fraud as a Service (FaaS)
What it is Fraud as a Service is the crimeware gig economy. Instead of building scams from scratch, criminals rent or buy ready-made tools - phishing kits, malware droppers, spoofed sites, call-center scripts, money-mule networks - often with ...
 
Firewall
What it is A firewall is a gatekeeper for your network - it filters traffic so only approved connections get through. Firewalls can be hardware (built into routers or dedicated appliances) or software (on your computer or server). For a deeper look ...
 
File Format
What it is A file format is the blueprint for how data is stored inside a file - its structure, encoding, and rules. The format tells apps how to read, write, and display what’s inside (text, images, audio, spreadsheets, etc.). Why it matters Pick ...
 
FileRepMalware
What it is FileRepMalware is a generic warning label some antivirus tools use for files that look risky - often because they’re new, rare, unsigned, or show suspicious behavior. It doesn’t name a specific virus; it means “this file has a bad ...
 
Fileless Attacks
What it is A fileless attack runs malicious code directly in memory or abuses built-in tools (PowerShell, WMI, Office macros) so there’s little or nothing written to disk. That stealth lets it slip past traditional antivirus and move quickly inside a ...
 
Fileless Malware
What it is Fileless malware runs from memory instead of dropping obvious files on your disk. It often abuses built-in tools (like PowerShell or WMI) and trusted apps, making it harder for traditional antivirus to spot. How it works You visit a ...
 
File-infecting Virus
What it is A file-infecting virus hides inside legit programs (like .exe or .dll). When you run the program, the virus runs too - then copies itself into other executables, spreading across the PC and sometimes network drives or USBs. What you may ...
 
FakeAV (Fake Antivirus)
What it is FakeAV is scareware that pretends to be antivirus. It fakes “deep scans,” invents dozens of threats, and pressures you to pay for a bogus cleanup—or it quietly installs more malware. Learn the telltale signs in our FakeAV explainer. What ...
 
Facial Recognition
What it is Facial recognition is a way to identify or unlock something using your face - similar to a fingerprint, but with a camera. It maps your facial features into a numerical template and compares that template to a stored one. For a deeper look ...