Z
 
Zombie Process
What it is A zombie process (also called defunct) is a program that already finished, but a tiny entry is still stuck in the system’s process list. This happens mostly on Linux/macOS when a “child” program ends and its “parent” hasn’t picked up the ...
 
Zombies
What it is In security, a zombie is a hacked computer that an attacker controls from far away. Your PC keeps working like normal, but in the background it follows commands as part of a botnet - sending spam, launching DDoS attacks, or trying to break ...
 
Zip Bomb
What it is A zip bomb (decompression bomb) is a tiny-looking archive that explodes into an enormous amount of data when you try to open or scan it. The goal is to freeze or crash your app (or even your antivirus) by using up CPU, RAM, or disk space. ...
 
Zero-Day Attack
What it is A zero-day attack hits a software flaw that the vendor doesn’t know about yet, so there’s no official patch. Criminals find the bug and use it right away, often before security tools catch up. Simple explainer and examples: ...
 
Zero Trust
What it is Zero Trust is a security approach that treats every request as untrusted until it is verified. It checks the user, the device, and the request each time - even inside your own network - instead of assuming “inside = safe.” Quick explainer ...