P
 
PUABundler
What it is PUABundler refers to installers that sneak extra programs alongside the app you intended to get. Add-ons are often pre-checked or hidden behind an Express/Recommended path, so users unknowingly install toolbars, trials, or updaters that ...
 
PSW.Stealer (Trojan-PWS)
What it is A password-stealing trojan for Windows that harvests credentials and other sensitive data, then exfiltrates it to the attacker. See our overview for defenders for details. Why it matters Once stolen, credentials enable account takeovers, ...
 
Pseudoransomware
What it is Pseudoransomware imitates ransomware but doesn’t encrypt your files. It shows scary messages, claims your data is locked, and demands payment. The goal is panic, not crypto-grade locking. Why it matters It’s cheap and fast for criminals to ...
 
Proxy Server
What it is A proxy server sits between your device and the internet, forwarding your requests and returning the responses. It can filter traffic, hide your IP, cache content, or enforce policy. See our overview for defenders for a deeper dive. Why it ...
 
Private Addressing
What it is Private addressing uses special IP ranges reserved for inside networks only. Home and office devices get addresses like 192.168.x.x, 10.x.x.x, or 172.16–172.31.x.x so they can talk to each other while sharing one public IP on the internet. ...
 
Pop-Up Ad
What it is A pop-up ad is a small window or overlay that appears on top of the page you are viewing. It is a legit advertising format, but criminals also abuse it for fake alerts, scareware, malvertising, and bogus update prompts. For common examples ...
 
Phishing
What it is Phishing is a scam where someone pretends to be a trusted person or service to trick you into giving up passwords, card numbers, or other sensitive data. It shows up in email, texts, social DMs, and look-alike websites. For a quick ...
 
Pharma
What it is In cybersecurity, pharma refers to spam and scam websites that push fake, illegal, or improperly sourced medications. They often copy the look of real pharmacies to trick buyers into sharing credit cards, prescriptions, or personal data. ...
 
Personal Firewall
What it is A personal firewall is a security app on your computer or phone that watches and controls network traffic. It blocks unexpected connections, alerts you to suspicious apps, and helps keep hackers out on home and public Wi-Fi. Why it matters ...
 
Permutation
What it is A permutation is a cryptography trick that rearranges characters or bits without changing them. Think of it as shuffling the deck - the same cards, new order. By itself it only hides the order, but combined with other steps it helps build ...
 
Patch
What it is A patch is a small software update that fixes bugs, closes security holes, or adds minor features to an app or operating system. Vendors release patches regularly so your software stays stable and safe. For background and examples, see our ...
 
Password Sniffer
What it is A password sniffer is malware or a rogue tool that captures login credentials as they travel over a network. On unsafe Wi-Fi or misconfigured systems, it can read usernames, passwords, cookies, and session tokens to hijack accounts without ...
 
Packet Switching
What it is Packet switching breaks your data into small packets that travel independently across a network and get reassembled at the destination. It is how the internet moves everything from emails to videos quickly and reliably. Why it matters By ...
 
Packet Sniffing
What it is Packet sniffing is the inspection of network traffic as it flows across a wire or Wi-Fi. Admins use it to troubleshoot and secure networks, while attackers use it to steal logins, spy on activity, or stage malware. For a short primer and ...