One of the transport protocols used to transmit data on the Internet. UDP sends packets of information without checking the receiver availability or packet integrity. This protocol is less reliable, but faster than TCP. It is suitable for transferring large… Read Full Article

User and Entity Behavior Analytics (UEBA) is a cyberthreat detection technology based on behavioral analysis of users, devices, applications, and other objects in an information system. The main task of UEBA is the timely detection of targeted attacks and insider… Read Full Article

UEFI (Unified Extensible Firmware Interface) was developed by the UEFI Forum consortium based on specifications initially provided by Intel as a successor to the BIOS (although most UEFI firmware images provide legacy support for BIOS services). UEFI provides support for… Read Full Article

The basic standard used to encode characters on the Internet. Unicode defines a mapping method for encoding character sets (such as alphabets, punctuation, auxiliary elements) in hexadecimal format. It supports a large number of different character sets, including hieroglyphs and… Read Full Article

The substitution of the address of a site in the address bar through a vulnerability in the browser or other program. It is used by online scammers (for example, owners of phishing sites that steal victims’ personal data) so as… Read Full Article

USB provides a ‘plug-and-play’ standard for connecting many peripheral devices to a computer simultaneously, without the need for a specific device adapter card for each device. USB allows up to 127 devices to connect to a single computer and allows… Read Full Article

Use-After-Free (UAF) is a vulnerability related to incorrect use of dynamic memory during program operation. If after freeing a memory location, a program does not clear the pointer to that memory, an attacker can use the error to hack the… Read Full Article

A Windows security component that controls the launch of programs requiring administrator privileges. It runs in the background and prompts for confirmation if an application attempts to perform an action affecting critical system elements.

A set of identifiers sent to the server when an Internet resource is visited. A user agent contains information about the application and the device from which the website is accessed, plus other information needed to correctly display the requested… Read Full Article

USSD (Unstructured Supplementary Service Data) is a communications protocol used in GSM networks for sending short text messages. USSD is similar in format to SMS. However, it is an instant messaging service, so messages are not stored on the operator… Read Full Article

One of the most common encodings used on the Internet. UTF-8 is essentially a way of representing all characters in the Unicode standard. A key feature of UTF-8 is its compactness—unlike the first Unicode tables, 1-4 bytes are required to… Read Full Article

UTM (unified threat management) is a universal security gateway that provides comprehensive protection against network threats. UTMs integrate firewall, spam filter, and IPS capabilities alongside other security technologies. Read Full Article