bg
ReasonLabs Cyberpedia
Discover the fundamental cybersecurity concepts, terms and topics affecting consumers today in ReasonLabs’ Cyberpedia
illustration

B

Backporting

Backporting is the term used to describe a software patch or update that is taken from a recent version, and applied to an older version of the same software. Backporting is commonly used for important security patches or updates that should be applied across all active versions of the software.

Read more

Behavioral Analysis

Behavioral analysis uses machine learning, artificial intelligence, big data, and analytics to detect malicious behavior on a device or network, by analyzing the differences in everyday activities.

Read more

Boot Sector Virus

A boot sector, also known as a 'boot block', is the reserved sector of a disk or storage device, which contains necessary data or code concerning how to start the boot process, in order to load an operating system..

Read more

Botnet

A botnet is a network of computers infected with malware that is controlled by a bot herder. Each individual device within the botnet network is called a bot.

Read more

Bot Herder

A bot herder is someone who operates a botnet infrastructure and uses the compromised computers to launch attacks designed to crash a target’s network, gain credentials, inject malware, or execute tasks. Once a bot herder has compiled their bot network, they use command programming to drive their next actions.

Read more

Browser Mining

Browser mining is a type of cryptocurrency mining that occurs inside of a web browser. Unlike the more widely known file-based cryptocurrency mining method, whereby a dedicated executable file is downloaded and run, browser mining is often implemented using a scripting language.

Read more

Brute Force Attacks

Brute force attacks (also known as brute force cracking) occur when a threat actor tries to gain access to a system or network by systematically trying as many combinations of usernames and guessed passwords as possible.

Read more

C

C2

Command and Control Infrastructure, also known as C2 or C&C, is the set of tools and techniques that attackers use to maintain communication with compromised devices following initial exploitation.

Read more

Catfishing

Catfishing refers to the process of establishing a false profile on a dating or social networking website or mobile application, in order to deceive and / or abuse others.

Read more

Central Processing Unit (CPU)

The CPU is a hardware chip located inside a device. It is the core component of a computing device, yet it can only function alongside other hardware.

Read more
11 - 20 of 112 definitions