Cybersecurity Glossary

Simple explanations of common cybersecurity terms.

Jump to letter

  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Z

Término no encontrado

A

Adware

A program that displays unwanted ads on your device. They are often installed alongside free software and can slow down your system, interfere with your browsing, and collect your data without permission.

Ataque DDoS (Denegación de Servicio Distribuida)

Ataque que inunda un sitio web o servidor con tráfico masivo desde múltiples dispositivos comprometidos, dejándolo inaccesible para los usuarios legítimos.

Artificial Intelligence

Technology that allows machines to learn, reason, and make decisions by simulating human thought processes. Artificial intelligence is increasingly used in cybersecurity and cyberattacks.

B

Backdoor

Hidden access to a system created to evade security measures, and used by attackers or even developers as emergency access.

Bot

An automated program that performs repetitive tasks. Depending on how it is used, it could be harmless (such as a chatbot) or malicious (such as a bot that launches attacks or sends spam).

Bot herder (bot owner)

This is the person or group that controls bot networks. They are also called “bot masters” or “zombie masters.”

Botnet

A network of devices infected with bots and controlled by cybercriminals to carry out attacks such as DDoS, send spam, or distribute malware without users' knowledge.

C

Captcha

A system/test that verifies that the user is a human and not a bot. It may ask users to select images, solve a puzzle, or enter distorted text.

Cloud Security

Practices and technologies designed to protect data stored on cloud platforms or services such as Google Drive or Dropbox from theft, unauthorized access, or data loss.

Cryptojacking

The covert and illegal use of your device to mine cryptocurrency, which can cause overheating, slowness, and excessive resource consumption.

Cyberbullying

A form of harassment that occurs through any digital media, such as social media or messaging, including threats, insults, or the spreading of false information.

Cybersecurity

The technologies, processes, and practices designed to protect IT networks, systems, and data from unauthorized access and cyberattacks.

Cookie

It is a text file that is sometimes sent to a user when they visit a website. Its purpose is to record the user's visit and store certain information about it.

D

Deepfake

Content (videos, images, or audio) manipulated with artificial intelligence to falsify faces or voices and imitate real people, making it difficult to distinguish from authentic content.

DDoS (Distributed Denial of Service) Attack

An attack that saturates a website or server with massive volumes of traffic from multiple compromised devices, rendering it inaccessible.

Dialer

A malicious program that makes calls or connections to premium-rate phone numbers without your authorization, generating high phone bills.

DoS (Denial of Service) Attack

An attack that seeks to block access to a system or service by overwhelming it with requests from a single source.

E

Exploit

Digital code or technique that takes advantage of a vulnerability in a system to perform malicious actions.

F

Firewall

​​A security system that controls incoming and outgoing network traffic, blocking unauthorized access in order to protect a device.

 

More information on how the Panda Security firewall works.

G

GDPR (General Data Protection Regulation)

A European law that protects citizens' personal data and establishes rules for its collection, storage, and use.

H

Hoax

Fake news or rumors circulating online that aim to confuse, scare, or manipulate people.

Honeypot

A trap that simulates a vulnerable target to attract cyberattackers and study their methods without risking real data.

I

Identity Theft

Unauthorized use of someone's personal data to impersonate them, commit fraud, or open accounts in their name.

Infection Method

How malware enters a device (malicious links, downloads, USB drives, or email attachments).

J

Jailbreak

Modification of devices—especially Apple devices—to remove manufacturer restrictions and install unofficial apps, compromising security.

K

Keylogger (Capturador de teclado)

Software or hardware that records keystrokes to steal passwords, messages, bank data, and other sensitive information.

L

LAN (Local Area Network)

It is a local area network, or group of computers connected to each other within a small geographical area (usually within the same city, town, or building).

 

More information on how Panda Security protects your network.

M

Malware

Any type of malicious software designed to damage, spy on, or take control of a system without the user's consent.

 

More information on how Panda Security protects you against malware.

Mobile Malware

Malware designed specifically for smartphones or tablets.

N

Network Attack

A deliberate attempt to access, disrupt, or damage an IT network through techniques like port scanning or exploiting vulnerabilities.

O

OAuth

An open standard for secure authorization that allows users to grant limited access to their data without sharing passwords (used by Google, Facebook login, etc.).

P

Petya

Ransomware that encrypts the entire disk, preventing the system from booting and demanding a ransom.

Pharming

A technique that redirects users to fake websites even when they enter the correct address.

Phishing

Engaño digital que imita mensajes de empresas reales para robar contraseñas, datos bancarios u otra información personal.

 

Más información sobre cómo Panda Security te protege frente al phishing.

Phishing

A scam that imitates real companies to steal passwords, bank details, or personal information.

 

Learn how Panda Security detect and block malicious websites and protect yourself against phishing attacks.

Privacy

A user’s right to decide how their personal information is collected, used, and shared online.

 

Learn more about how Panda Security protects your privacy.

Privacy Policy

A document explaining how a website or app collects, stores, uses, and protects personal data.

Proactive Protection

Security systems that detect threats before they cause harm by analyzing real-time behavior.

Propagation Method

How malware spreads: mass emails, social media, infected websites, external drives, etc.

Proxy

An intermediate server that hides your IP address, improves privacy, or bypasses geolocation blocks

PUP (Potentially Unwanted Program)

An application installed without consent, often bundled with other software, that affects performance or shows ads.

R

Ransomware

Malware that blocks access to files or systems and demands a ransom for recovery.

 

More information about Panda Security's anti-ransomware

Revenge Porn

Unauthorized sharing of intimate content to humiliate or harm someone.

Rogueware

Fake security software that pretends to detect threats to trick users into paying for useless or harmful services.

Root

Full administrative access to a system’s files and settings.

Rootkit

A set of tools that hides malware or unauthorized access, making detection difficult.

S

Scam

Online fraud aimed at obtaining money or personal data through deceptive methods.

Scareware

Software that generates fake virus alerts to scare users into installing harmful programs.

Sexting

Voluntary sending of intimate content. The risk arises when it is shared without consent.

Smishing

SMS-based phishing that uses text messages to trick users or steal information.

Social Engineering

Manipulating people emotionally to obtain confidential information or cause security mistakes.

Spam

Unsolicited messages, typically advertisements, sent massively via email or other channels.

Spear Phishing

A targeted form of phishing using personalized details to deceive specific victims.

Spyware

Software that secretly monitors user activity and collects sensitive information.

 

More information about Panda Security's anti-spyware.

Stalkerware

Software used to spy on someone’s device without their knowledge (location, messages, calls).

T

Trojan

Malware disguised as legitimate software to trick users and infect a system.

Two-Factor Authentication (2FA)

Software that secretly monitors user activity and collects sensitive information.

 

More information about Panda Security's anti-spyware.

U

UPX

A tool that compresses executable files and allows them to be run directly without decompressing them, used both for legitimate purposes and by malware to evade detection.

V

Virus

Malware that attaches to files or programs and replicates to infect other systems.

 

More information about Panda Security antivirus.

Virus builder

A tool that allows users with little technical knowledge to create customized malware.

Vishing

Phishing conducted through phone calls (voice phishing), where attackers impersonate legitimate entities.

VPN (Virtual Private Network)

W

Wannacry

A massive ransomware attack in 2017 that locked files globally and demanded Bitcoin payments.

Worm

Malware that spreads automatically without user interaction.

X

XDR (Extended Detection and Response)

Security solution that unifies threat detection and response across multiple vectors (email, network, endpoints, servers, etc.) to provide an integrated view.

XSS (Cross-Site Scripting)

A type of web vulnerability in which an attacker inserts malicious scripts into pages viewed by other users. It affects data integrity and privacy.

Z

Zero Trust

An infected device controlled remotely—often part of a botnet—to carry out illegal activities.

Zombie

Ordenador controlado mediante la utilización de bots.

Need help?

Call us 24 hours a day, 7 days a week, and get a free diagnosis.