Introduction to the ESET Glossary
Detections
Adware
Botnet
Bot
Command and Control Server
False positive (FP)
Potentially unsafe applications
Potentially unwanted applications
Ransomware
Rootkit
Return-oriented programming
Spyware
Suspicious application
Trojan
Virus
Companion Virus
File virus, Parasitic virus
HLL Viruses
Overwriting viruses
Retroviruses
Worm
Remote attacks
Credential stuffing
DNS Poisoning
DDoS attack
ICMP attack
Port scanning
SMB Relay
TCP desynchronization
Worm attack
ARP Cache Poisoning
Email threats
Advertisements
Hoaxes
Phishing
Spearphishing
Recognizing spam scams
Rules
Whitelist
Blacklist
Exception
Server-side control
ESET technologies
Advanced Memory Scanner
Banking & Payment Protection
Botnet Protection
DNA Detections
ESET AI Advisor
ESET LiveGrid®
ESET LiveSense
Exploit Blocker
Java Exploit Blocker
Machine learning
Network Attack Protection
Parental Control
Ransomware Shield
Script-Based Attacks Protection
Secure Browser
UEFI Scanner
Other
Antispyware
Antivirus
APT Group
Artificial intelligence
BIOS
Boot Sector
Boot Sector Virus
Bootkit
Firmware
Master Boot Record
UEFI
Canary file
Catfishing
Cloud
Cryptojacking
Cryptomining
Cyberbulliying
Dark Web
Deadlock
Email Sender Spoofing
Encryption
Exploit
Firewall
Hacker
HIPS
Hoax
Honeypot
Identity Theft
Infostealer
IoT
Nomophobia
Malware
Man-in-the-middle
Memory Dump
Multifactor Authentication
Payload
Polymorphism
Quarantine
RDP
Sexting
Social engineering
Spam
Spoofing
Steganography
Zero-day
Vishing
VPN
Last updated: November 20, 2024