Introduction to the ESET Glossary
Detections
Adware
Botnet
Bot
Command and Control Server
False positive (FP)
Potentially unsafe applications
Potentially unwanted applications
Ransomware
Rootkit
Return-oriented programming
Spyware
Suspicious application
Trojan
Virus
Companion Virus
File virus, Parasitic virus
HLL Viruses
Overwriting viruses
Retroviruses
Worm
Remote attacks
Credential stuffing
DNS Poisoning
DDoS attack
ICMP attack
Port scanning
SMB Relay
TCP desynchronization
Worm attack
ARP Cache Poisoning
Email threats
Advertisements
Hoaxes
Phishing
Spearphishing
Recognizing spam scams
Rules
Whitelist
Blacklist
Exception
Server-side control
ESET technologies
Advanced Memory Scanner
Banking & Payment Protection
Botnet Protection
DNA Detections
ESET AI Advisor
ESET LiveGrid®
ESET LiveSense
Exploit Blocker
Java Exploit Blocker
Machine learning
Network Attack Protection
Parental Control
Ransomware Shield
Script-Based Attacks Protection
Secure Browser
UEFI Scanner
Security Technologies
Antispyware
Antivirus
Firewall
HIPS
Honeypot
Multifactor Authentication
Quarantine
VPN
Threats and Attacks
APT Group
Cryptojacking
Cryptomining
Exploit
Hacker
Hoax
Identity Theft
Infostealer
Malware
Man-in-the-middle
Payload
Polymorphism
Smishing
Social engineering
Spoofing
Steganography
Vishing
Wiper
Zero-day
Concepts and Terms
Artificial intelligence
BIOS
Boot Sector
Boot Sector Virus
Bootkit
Firmware
Master Boot Record
UEFI
Cloud
Encryption
IoT
Memory Dump
RDP
Sexting
Miscellaneous
Canary file
Catfishing
Cyberbullying
Dark Web
Deadlock
Email Sender Spoofing
Nomophobia
Spam