Cybersecurity Glossary

All | # A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
F
Fail Safe
A FailSafe security system or device is an automatic protection system that intervenes when a hardware or software failure is detected.
Fake Antivirus Malware
Rogue antivirus or rogue security is a form of computer malware that simulates a system infection that needs to be removed. The users are asked for money in return for removal of malware, but it is nothing but a form of ransomware.
False Positive
is identified when a security solution detects a potential cyber threat which is, in fact, a harmless piece of software or a benign software behavior. For example, antivirus could inform the user there’s a malware threat on the PC, but it could also happen that the program it’s blocking is safe.
File Binder
applications used by online criminals to connect multiple files together in one executable that can be used in launching malware attacks.
Fileless malware
types of malicious code used in cyber attacks that don’t use files to launch the attack and carry on the infection on the affected device or network. The infection is run in the RAM memory of the device, so traditional antivirus and anti-malware solutions can’t detect it at all. Malicious hackers use file less malware to achieve stealth, privilege escalation, to gather sensitive information and achieve persistence in the system, so the malware infection can continue to carry on its effect for a longer period of time.
Financial malware
specialized malicious software designed to harvest financial information and use it to extract money from victims’ accounts. It is a new type of malware, that is also very sophisticated and can easily bypass traditional security measures, such as antivirus. Financial malware is capable of persisting in the affected system for a long time, until it gathers the information associated with financial transactions. It can also start to leak money from the targeted account. Banking fraud cyber crimes are one of the most serious cyber threats in the current risk landscape.
Firewall
a piece of architecture within a network security system designed to prevent unauthorized access to public or private networks. Its purpose is to control incoming and outgoing communication based on a set of rules.
Flip Button
In the malware world, a flip button appears when spyware or adware solutions trick users into following various actions and installing malicious software on the system.
Flooding
a security attack used by hackers against a number of servers or web locations. Flooding is the process of sending a large amount of information to such a location in order to block its processing power and stop its proper operation.
Forensic Specialist
in IT security is a professional who identifies and analyzes online traffic and data transfer in order to reach a conclusion based on the discovered information.
FormGrabbing Malware
Can harvest your confidential data when you’re filling in a web form, before the data is sent over the Internet, to a secure server. By doing this, the malware can avoid the security ensured by an HTTPS connection. Unfortunately, using a virtual keyboard, autofill or copy/paste won’t protect you from this threat. The malware can categorize data according to type (username, password, etc.) and even grab the URL where the user input information.