• Introduction to the ESET Glossary
  • Detections
    • Adware
    • Botnet
      • Bot
      • Command and Control Server
    • False positive (FP)
    • Potentially unsafe applications
    • Potentially unwanted applications
    • Ransomware
    • Rootkit
    • Return-oriented programming
    • Spyware
    • Suspicious application
    • Trojan
    • Virus
      • Companion Virus
      • File virus, Parasitic virus
      • HLL Viruses
      • Overwriting viruses
      • Retroviruses
    • Worm
  • Remote attacks
    • Credential stuffing
    • DNS Poisoning
    • DDoS attack
    • ICMP attack
    • Port scanning
    • SMB Relay
    • TCP desynchronization
    • Worm attack
    • ARP Cache Poisoning
  • Email threats
    • Advertisements
    • Hoaxes
    • Phishing
      • Spearphishing
    • Recognizing spam scams
      • Rules
      • Whitelist
      • Blacklist
      • Exception
      • Server-side control
  • ESET technologies
    • Advanced Memory Scanner
    • Banking & Payment Protection
    • Botnet Protection
    • DNA Detections
    • ESET AI Advisor
    • ESET LiveGrid®
    • ESET LiveSense
    • Exploit Blocker
    • Java Exploit Blocker
    • Machine learning
    • Network Attack Protection
    • Parental Control
    • Ransomware Shield
    • Script-Based Attacks Protection
    • Secure Browser
    • UEFI Scanner
  • Other
    • Antispyware
    • Antivirus
    • APT Group
    • Artificial intelligence
    • BIOS
      • Boot Sector
        • Boot Sector Virus
        • Bootkit
      • Firmware
      • Master Boot Record
      • UEFI
    • Canary file
    • Catfishing
    • Cloud
    • Cryptojacking
    • Cryptomining
    • Cyberbullying
    • Dark Web
    • Deadlock
    • Email Sender Spoofing
    • Encryption
    • Exploit
    • Firewall
    • Hacker
    • HIPS
    • Hoax
    • Honeypot
    • Identity Theft
    • Infostealer
    • IoT
    • Nomophobia
    • Malware
    • Man-in-the-middle
    • Memory Dump
    • Multifactor Authentication
    • Payload
    • Polymorphism
    • Quarantine
    • RDP
    • Sexting
    • Social engineering
    • Spam
    • Spoofing
    • Steganography
    • Zero-day
    • Vishing
    • VPN