M
 
Multipartite Virus
What it is A multipartite virus is malware that attacks more than one place at once - for example the boot sector and your files. That dual foothold helps it spread faster and makes cleanups tricky, since removing one part can leave the other hiding. ...
 
Money Mule
What it is A money mule is a person who lets criminals move stolen money through their bank account. Scammers pitch it as easy “remote work” or a quick favor. In reality, you’re laundering funds and can face frozen accounts, debt, or criminal ...
 
Mobile Malware
What it is Mobile malware is malicious software that targets phones and tablets. It can steal messages and passwords, spy through permissions, hijack your browser, or lock files for ransom. Infections usually arrive through shady apps, smishing ...
 
Mobile Code
What it is Mobile code is code that arrives with a page, message, or app and runs automatically on your device. Think scripts, macros, plug-ins, and mini apps that add features like forms, animations, or in-app widgets. When misused, the same ...
 
MITM (Man In The Middle)
What it is A Man in the Middle (MITM) attack is eavesdropping with extra steps: an attacker quietly positions between you and a website or app, reading or altering traffic as it passes. For a short primer and examples, see our MITM explainer. Why it ...
 
MFA (Multi-Factor Authentication)
What it is Multi-Factor Authentication (MFA) adds an extra check when you sign in, so it is not just a password. You confirm with something you know (password) plus something you have or are. For a short primer, see our MFA explainer. Why it matters ...
 
Metamorphic Malware
What it is Metamorphic malware is malicious code that rewrites itself each time it runs or spreads. Instead of just encrypting its body, it restructures its own code - changing instructions, order, and appearance - while keeping the same bad ...
 
Metadata
What it is Metadata is information about your data. It describes who made a file, when and where it was created, what device or app was used, and how it should be organized. Think of it as the label on the box that helps systems and people understand ...
 
Memory Forensics
What it is Memory forensics is the practice of analyzing a computer’s RAM to see what is happening right now or just happened. By capturing and examining memory, investigators can spot active processes, network connections, passwords in use, and ...
 
Medusa Ransomware (MedusaLocker)
What it is MedusaLocker is ransomware that encrypts your files and demands a cryptocurrency payment to unlock them. It often arrives through email lures or exposed services, then spreads across the network. Technical details and IOCs are in our ...
 
Malware Sandboxing
What it is Malware sandboxing runs suspicious files or links in a safe, isolated environment so analysts and security tools can watch what they do without risking real systems. It is like a quarantine room for code under inspection. Why it matters ...
 
Malware Obfuscation
What it is Malware obfuscation is the trick of disguising malicious code so security tools and analysts cannot recognize it. Attackers change how the code looks and runs without changing what it does, letting the same malware slip past filters again ...
 
Malware
What it is Malware is any software made to harm your device or data. It can steal passwords, lock your files, spy on activity, or hijack your browser. For a quick primer and examples, see our malware explainer. How it spreads Phishing emails and fake ...
 
Malvertising
What it is Malvertising is when attackers hide malicious code inside online ads. You don’t have to click a sketchy site - a booby-trapped ad on a legit page can redirect, phish, or install malware through drive-by downloads and pop-ups. How it works ...
 
Malicious Code
What it is Malicious code is any program or script written to harm systems or data. It exploits weaknesses to steal information, corrupt files, spy on activity, or open a backdoor so attackers can get back in later. Think of it as code with the goal ...
 
Macro Virus
What it is A macro virus hides inside Office files like Word documents or Excel spreadsheets and runs tiny programs called macros when you open the file. Criminals use it to download more malware or steal data. For background and safe settings, see ...
 
MacBooster.gen
What it is MacBooster.gen is a detection name for MacBooster, a Mac potentially unwanted program (PUP) promoted as a cleanup or speed-up tool. It often rides along with other installs and then pushes aggressive scans, pop-ups, and paid upgrades. ...
 
Madware
What it is Madware is aggressive mobile advertising. It stuffs your phone or tablet with pop-ups, full-screen ads, notification spam, and sneaky redirects. While not always outright malware, it invades privacy, slows performance, and can open the ...