bg
ReasonLabs Cyberpedia
Discover the fundamental cybersecurity concepts, terms and topics affecting consumers today in ReasonLabs’ Cyberpedia
illustration

F

Fileless Malware

Fileless malware is a type of malicious activity that uses native, legitimate tools built into a system to execute a cyber attack. Unlike traditional malware, fileless malware does not need an executable file, making it hard to detect.

Read more

File Integrity Monitoring (FIM)

File Integrity Monitoring is a security process that monitors and analyzes the integrity of critical assets, and checks them for unauthorized changes or corruption that may indicate a security breach - including file systems, directories, databases, network devices, the operating system (OS), OS components and software applications for signs of tampering or corruption, all of which could indicate a cyberattack that would then require further investigation.

Read more

Firewall

A firewall is software that every device, both in personal and enterprise setting, needs in order to prevent unauthorized access to a network. Using a set of rules to identify and block threats, a firewall inspects incoming and outgoing traffic, in order to mitigate threats.

Read more

Formjacking

Formjacking is a new form of digital information theft. As consumers have become smarter regarding password management and phishing scams, the criminal playbook has evolved to new software hacks to steal personal information.

Read more
1 - 4 of 4 definitions