Data Threats Beginning With B

Backdoor Trojan

A backdoor Trojan allows someone to take control of a user’s computer via the Internet without their permission.

Boot sector malware

Boot sector malware spreads by modifying the program that enables your computer to start up.


A botnet is a collection of infected computers that are remotely controlled by a hacker.

Browser hijacker

Browser hijackers change the default homepage and search engine in your Internet browser without your permission.

Brute force attack

A brute force attack is one in which hackers try a large number of possible keyword or password combinations to gain unauthorized access to a system or file.

Buffer overflow

A buffer overflow occurs when a program stores excess data by overwriting other parts of the computer’s memory, causing errors or crashes.