Create an account
Type of spyware that collects information about a user's Web browsing habits. Adware often is used by Internet advertising firms
"Taking control of someone else's phone to make calls or send text messages, or to monitor communications. "
(aka direct harvesting attacks) use special software to guess addresses at a particular company and send blank email messages. those that don't come back are valid
when a hacker sets up a wireless network with the same name (SSID) as the wireless access point at a local hot spot
logic and time bombs
Software that sits idle until a specified circumstance or time triggers it, destroying programs, data
find confidential information using a computer while it travels the internet and other networks
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail
attacking phone systems to obtain free phone line access; send viruses; access, steal and destroy data
three meanings: (1) clandestine use of a neighbor's wifi (2) tapping into telecom line and electronically latching on to a legitimate user and go with them into the system (3) unauthorized person passing through secure door when authorized person opens it
creating a seemingly legitimate business, collecting personal information to make a sale and never delivering a product
"Software that conceals processes, files, network connections, memory addresses, systems utility programs, and system data from the operating system."
double swiping a credit card in a legit terminal or on a side card reader to keep the information
spam blogs, promote affiliated websites to increase google PageRank (how often a web page is referenced by other web pages)
computer software that is designed to collect personal info about users without their informed consent
A method of hiding data within another media type, such as graphic, WAV file, or document
hackers search for dial-up modem lines by programming computers to dial thousands of phone lines
a software program capable of reproducing itself that can spread from one computer to the next over a network
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together