ReasonLabs Cyberpedia
Discover the fundamental cybersecurity concepts, terms and topics affecting consumers today in ReasonLabs’ Cyberpedia


Cloud, The

The Cloud is a general term used to describe a network of servers that applies processing and storage capabilities. It refers to software and services that run on the internet, instead of locally on your computer.

Read more

Cloud Security

Cloud Security refers to control-based technologies and policies deployed to protect information, data, applications, and infrastructure associated with cloud computing.

Read more

Coin Miner

Coin mining is the process of running complex mathematical calculations that are necessary to maintain the blockchain ledger, in order to generate crypto coins.

Read more

Computer Virus

A computer virus is a type of malicious software loaded onto a user's computer, often without their knowledge. Much like an animal virus, it is designed to spread from host to host, and has the ability to replicate itself.

Read more

Credential Stuffing

Credential stuffing is a specific type of cyber attack where the attacker uses stolen account credentials, usually log in and password information, and uses them to access personal or private accounts through login forms. As users typically reuse credentials - choosing the same passwords for various accounts - once an attacker has hacked them, he can reuse these credentials to access many accounts on other sites as well.

Read more


Cryptography is the study of secure communication techniques within cybersecurity. Closely related to encryption, the aim is to allow only the sender and intended recipient of a message to view its contents, by encrypting the information. Obfuscation is used to blur texts and images - which can then be unscrambled using a 'key', in order to best transmit electronic data without it being intercepted.

Read more


Cryptojacking refers to the act of hijacking a computer to use it's power, in order to mine cryptocurrencies against a user's will while they are unaware. Cryptojacking can be achieved through a web browser or on a user's hard drive.

Read more


Cryptomining refers to the act of generating crypto coins - a digital currency that uses cryptography to record, sign and send transactions. It also involves verifying the legitimacy of cryptocurrency transactions on a blockchain.

Read more

Cyber Attack

A cyber attack is an attempt by cyber criminals, hackers, or other digital adversaries to access a computer network or system, usually for the purpose of altering, stealing, destroying, exposing, or altering the integrity information.

Read more

Cyber Espionage

Cyber espionage is a form of cyber attack that steals classified, sensitive data or intellectual property to gain an advantage over a competitive company or government entity.

Read more
21 - 30 of 112 definitions