Hello!
You’re about to visit our web page in English
Would you like to continue?
If this is not what you’re looking for,
Jump to letter
Término no encontrado
A
A program that displays unwanted ads on your device. They are often installed alongside free software and can slow down your system, interfere with your browsing, and collect your data without permission.
Ataque que inunda un sitio web o servidor con tráfico masivo desde múltiples dispositivos comprometidos, dejándolo inaccesible para los usuarios legítimos.
Technology that allows machines to learn, reason, and make decisions by simulating human thought processes. Artificial intelligence is increasingly used in cybersecurity and cyberattacks.
B
Hidden access to a system created to evade security measures, and used by attackers or even developers as emergency access.
An automated program that performs repetitive tasks. Depending on how it is used, it could be harmless (such as a chatbot) or malicious (such as a bot that launches attacks or sends spam).
This is the person or group that controls bot networks. They are also called “bot masters” or “zombie masters.”
A network of devices infected with bots and controlled by cybercriminals to carry out attacks such as DDoS, send spam, or distribute malware without users' knowledge.
C
A system/test that verifies that the user is a human and not a bot. It may ask users to select images, solve a puzzle, or enter distorted text.
Practices and technologies designed to protect data stored on cloud platforms or services such as Google Drive or Dropbox from theft, unauthorized access, or data loss.
The covert and illegal use of your device to mine cryptocurrency, which can cause overheating, slowness, and excessive resource consumption.
A form of harassment that occurs through any digital media, such as social media or messaging, including threats, insults, or the spreading of false information.
The technologies, processes, and practices designed to protect IT networks, systems, and data from unauthorized access and cyberattacks.
It is a text file that is sometimes sent to a user when they visit a website. Its purpose is to record the user's visit and store certain information about it.
D
Content (videos, images, or audio) manipulated with artificial intelligence to falsify faces or voices and imitate real people, making it difficult to distinguish from authentic content.
An attack that saturates a website or server with massive volumes of traffic from multiple compromised devices, rendering it inaccessible.
A malicious program that makes calls or connections to premium-rate phone numbers without your authorization, generating high phone bills.
An attack that seeks to block access to a system or service by overwhelming it with requests from a single source.
E
Digital code or technique that takes advantage of a vulnerability in a system to perform malicious actions.
F
A security system that controls incoming and outgoing network traffic, blocking unauthorized access in order to protect a device.
More information on how the Panda Security firewall works.
G
A European law that protects citizens' personal data and establishes rules for its collection, storage, and use.
H
Fake news or rumors circulating online that aim to confuse, scare, or manipulate people.
A trap that simulates a vulnerable target to attract cyberattackers and study their methods without risking real data.
I
Unauthorized use of someone's personal data to impersonate them, commit fraud, or open accounts in their name.
How malware enters a device (malicious links, downloads, USB drives, or email attachments).
J
Modification of devices—especially Apple devices—to remove manufacturer restrictions and install unofficial apps, compromising security.
K
Software or hardware that records keystrokes to steal passwords, messages, bank data, and other sensitive information.
L
It is a local area network, or group of computers connected to each other within a small geographical area (usually within the same city, town, or building).
More information on how Panda Security protects your network.
M
Any type of malicious software designed to damage, spy on, or take control of a system without the user's consent.
More information on how Panda Security protects you against malware.
Malware designed specifically for smartphones or tablets.
N
A deliberate attempt to access, disrupt, or damage an IT network through techniques like port scanning or exploiting vulnerabilities.
O
An open standard for secure authorization that allows users to grant limited access to their data without sharing passwords (used by Google, Facebook login, etc.).
P
Ransomware that encrypts the entire disk, preventing the system from booting and demanding a ransom.
A technique that redirects users to fake websites even when they enter the correct address.
Engaño digital que imita mensajes de empresas reales para robar contraseñas, datos bancarios u otra información personal.
Más información sobre cómo Panda Security te protege frente al phishing.
A scam that imitates real companies to steal passwords, bank details, or personal information.
Learn how Panda Security detect and block malicious websites and protect yourself against phishing attacks.
A user’s right to decide how their personal information is collected, used, and shared online.
Learn more about how Panda Security protects your privacy.
A document explaining how a website or app collects, stores, uses, and protects personal data.
Security systems that detect threats before they cause harm by analyzing real-time behavior.
How malware spreads: mass emails, social media, infected websites, external drives, etc.
An intermediate server that hides your IP address, improves privacy, or bypasses geolocation blocks
An application installed without consent, often bundled with other software, that affects performance or shows ads.
R
Malware that blocks access to files or systems and demands a ransom for recovery.
More information about Panda Security's anti-ransomware.
Unauthorized sharing of intimate content to humiliate or harm someone.
Fake security software that pretends to detect threats to trick users into paying for useless or harmful services.
Full administrative access to a system’s files and settings.
A set of tools that hides malware or unauthorized access, making detection difficult.
S
Online fraud aimed at obtaining money or personal data through deceptive methods.
Software that generates fake virus alerts to scare users into installing harmful programs.
Voluntary sending of intimate content. The risk arises when it is shared without consent.
SMS-based phishing that uses text messages to trick users or steal information.
Manipulating people emotionally to obtain confidential information or cause security mistakes.
Unsolicited messages, typically advertisements, sent massively via email or other channels.
A targeted form of phishing using personalized details to deceive specific victims.
Software that secretly monitors user activity and collects sensitive information.
More information about Panda Security's anti-spyware.
Software used to spy on someone’s device without their knowledge (location, messages, calls).
T
Malware disguised as legitimate software to trick users and infect a system.
Software that secretly monitors user activity and collects sensitive information.
More information about Panda Security's anti-spyware.
U
A tool that compresses executable files and allows them to be run directly without decompressing them, used both for legitimate purposes and by malware to evade detection.
V
Malware that attaches to files or programs and replicates to infect other systems.
More information about Panda Security antivirus.
A tool that allows users with little technical knowledge to create customized malware.
Phishing conducted through phone calls (voice phishing), where attackers impersonate legitimate entities.
A service that encrypts your connection, hides your location, and improves privacy—especially on public Wi-Fi.
More information about Panda Dome VPN
W
A massive ransomware attack in 2017 that locked files globally and demanded Bitcoin payments.
Malware that spreads automatically without user interaction.
X
Security solution that unifies threat detection and response across multiple vectors (email, network, endpoints, servers, etc.) to provide an integrated view.
A type of web vulnerability in which an attacker inserts malicious scripts into pages viewed by other users. It affects data integrity and privacy.
Z
An infected device controlled remotely—often part of a botnet—to carry out illegal activities.
Ordenador controlado mediante la utilización de bots.
Discover the Panda Dome plan that best fits your needs
You can take a look to every single product page (Panda Dome Essential, Panda Dome Advanced, Panda Dome Complete and Panda Dome Premium) or compare all our plans to take a decision.
Panda Security, a WatchGuard Technologies brand, offers the most advanced protection for your family and business. Its Panda Dome range provides maximum security against viruses, ransomware and computer espionage, and is compatible with Windows, Mac, Android and iOS.