Malware

Terms and concepts you should know

Paul Krzyzanowski

November 25, 2024

  • Malware
  • Worm
  • Virus
  • Spyware
  • Wiper
  • Denial of Service
  • Backdoor
  • Ransomware
  • Infiltration
  • Exfiltration
  • Trigger (Logic Bomb)
  • Dropper, multi-stage dropper
  • Bot, botnet, command & control server
  • Keylogger
  • Windows Hooks
  • Zero-day Vulnerability, Exploit
  • Zero-click Exploit
  • File Infector
  • USB and infected firmware
  • Autorun
  • Data leakage
  • Macro Viruses
  • Social Engineering
  • Deceptive download
  • Deceptive pop-up
  • Phishing
  • Spear Phishing
  • Smishing
  • Hiding Malicious URLs
  • Honeypots
  • Trojan Horse, remote access trojan
  • Overt vs. Covert Porpose
  • Startup Services
  • Bootkit
  • Rootkit
  • Kernel-mode, User-mode, and Hypervisor Rootkits
  • File-less malware
  • Typosquatting
  • Masquerading links
  • Malicious QR codes
  • SPF (Sender Policy Framework)
  • DKIM (DomainKeys Identified Mail)
  • DMARC (Domain-based Message Authentication, Reporting, and Conformance)
  • Signature-based Detection
  • Behavior-based Detection (Heuristic Analysis)
  • Signature Scanning
  • Encrypted malware
  • Packing, packer
  • Polymorphic Virus
  • Static Heuristic Analysis
  • Dynamic Heuristic Analysis
Last modified November 27, 2024.
recycled pixels