Navigating the world of antivirus software requires knowledge of technical terms and cybersecurity jargon.
Our Antivirus Glossary was written to clarify these concepts.
The developers earn money when a user clicks on them (pay per click).
Some adware can also contain more sinister threats likespyware.
you’ve got the option to take a look at thebest adware removal tools in 2025 here.
Android
Android is an operating system for mobile devices developed by Google.
Its based on a mobile-optimized version of the Linuxkernel.
View our list of thetop Android security apps here.
Antivirus
A program that scans your computers disk drives and/or programs forviruses.
These programs usually quarantine and delete any threats they find.See the top 10 antivirus programs on the market.
By contrast, programs that are open and visible are said to be running in the foreground.
Increasingly,virusesare targeting systems BIOS programs, so many vendors now include protection against them.
Blacklist
This parental control tool allows users to create a list ofURLsorIP addressesthat a program will block.
Because blocking a singleIP addresswill not stop the attack, they are often difficult to defend against.
Its used to secure all sorts of information, ranging from files to internet connections to prevent unauthorized access.
Endpoint
This is any internet-capable machine connected over a TCP/IP online grid.
It can happen because code samples from known viruses are often also present in harmless programs.
Read more about false positiveshere.
Both Mac and Windows come with built-in firewalls and manyantivirus tools include their own firewall component.
Check out2025s top VPNs here.
iOS
Apples operating system for mobile devices.
It is the default operating system used on devices such as the iPhone, iPad, and iPod Touch.
Take a look at thebest iOS security apps here.
Examples of ISPs include ComCast, Brightcast, or AT&T.
Kernel
The core of an operating system that controls all the components connected to the computer.
It also manages low-level system operations, including the allocation of system memory (RAM) and CPU resources.
Linux
A family of operating systems built on the Linuxkernel.
View thebest antiviruses for Linux in 2025.
Local Area internet (LAN)
A LAN is a internet of connected IP devices.
It can include both machines, such as desktops and laptops, and non-human interfaces, such as printers.
Check out thetop macOS antiviruses here.
Malware
Malware refers to any software thats created with the intent to cause harm.
Read more about man-in-the-middle attacks in our blog posthere.
Because they are often used to share content such as pirated movies and software illegally, manyISPsblock their traffic.
Thebest antiviruses of 2025all include anti-phishing protection.
Ports
A web connection port is a number identifying one side of a connection between two computers.
Ports help computers determine which utility or process is sending and receiving internet traffic.
Limiting open ports to prevent unauthorized online grid entry is an important function offirewalls.
Port Scanners
Port scanners automatically scan networks for open (active) or listening ports.
UnlikeVPNs, they do not transmit the traffic over a secure, encrypted tunnel.
Like VPNs, they can be used to avoid geolocation restrictions.
Ransomware
A form of malware that takes over a users computer before demanding a payment to self-delete.
Ransomware usually demands payment via a cryptocurrency such as Bitcoin, which allows the cybercriminal to operate anonymously.
Real-Time Scanning
Continuously checks files on an operating system as they are accessed.
Unlike on-demand scanning, it instantly detects and quarantines viruses as they are encountered.
Inmobile antivirusproducts, real-time protection scans newly downloaded apps as soon as they begin the installation process.
Rootkit
Clandestine computer programs that provide continuous elevated access to the criminals operating them.
Read more about rootkitshere.
Router
Provides wireless and wired (Ethernet/RJ45) connectivity to a local connection.
Boot firmware is typically eitherBIOSor its successor, UEFI.
Signature-Based Scanning
Detects viruses and malware based on known code excerpts, often called definitions.
Signature-based scanning engines can be supplemented byheuristic tools, which rely on pattern-recognition to detect threats.
Spyware
A key in of malware that secretly records the user and transmits information to cyber criminals.
Spyware can intercept microphones, webcams, and keyboards to get to capture potentially useful information.
Many internet security tools offerprotection against spyware.
Trojans
A jot down of malware that disguises itself as legitimate software.
This includes rogue antivirus software or programs that pose as detection tools but are actually malware.
It relies on a desktop program to operate.
The vast majority of viruses target Microsoft Windows.
Whitelist
A parental control tool that allows users to manually specifyURLsthat the program will allow access to.
This is typically used when the website would otherwise be blocked by category-based filtering.
Worm
A self-replicating malware that spreads between computers.
Read more about zero-day attackshere.
Still unsure and looking for recommendations?Check out our top 10.