ReasonLabs Cyberpedia
Discover the fundamental cybersecurity concepts, terms and topics affecting consumers today in ReasonLabs’ Cyberpedia



Command and Control Infrastructure, also known as C2 or C&C, is the set of tools and techniques that attackers use to maintain communication with compromised devices following initial exploitation.

Read more


Catfishing refers to the process of establishing a false profile on a dating or social networking website or mobile application, in order to deceive and / or abuse others.

Read more

Central Processing Unit (CPU)

The CPU is a hardware chip located inside a device. It is the core component of a computing device, yet it can only function alongside other hardware.

Read more

Cloud, The

The Cloud is a general term used to describe a network of servers that applies processing and storage capabilities. It refers to software and services that run on the internet, instead of locally on your computer.

Read more

Cloud Security

Cloud Security refers to control-based technologies and policies deployed to protect information, data, applications, and infrastructure associated with cloud computing.

Read more

Coin Miner

Coin mining is the process of running complex mathematical calculations that are necessary to maintain the blockchain ledger, in order to generate crypto coins.

Read more

Computer Virus

A computer virus is a type of malicious software loaded onto a user's computer, often without their knowledge. Much like an animal virus, it is designed to spread from host to host, and has the ability to replicate itself.

Read more

Credential Stuffing

Credential stuffing is a specific type of cyber attack where the attacker uses stolen account credentials, usually log in and password information, and uses them to access personal or private accounts through login forms. As users typically reuse credentials - choosing the same passwords for various accounts - once an attacker has hacked them, he can reuse these credentials to access many accounts on other sites as well.

Read more


Cryptography is the study of secure communication techniques within cybersecurity. Closely related to encryption, the aim is to allow only the sender and intended recipient of a message to view its contents, by encrypting the information. Obfuscation is used to blur texts and images - which can then be unscrambled using a 'key', in order to best transmit electronic data without it being intercepted.

Read more


Cryptojacking refers to the act of hijacking a computer to use it's power, in order to mine cryptocurrencies against a user's will while they are unaware. Cryptojacking can be achieved through a web browser or on a user's hard drive.

Read more
1 - 10 of 16 definitions