Advertisement Upgrade to remove ads


Type of spyware that collects information about a user's Web browsing habits. Adware often is used by Internet advertising firms


"Taking control of someone else's phone to make calls or send text messages, or to monitor communications. "


stealing contact lists, images, other data by using bluetooth

botnet, bot herders

network of zombie compute that can be remotely controlled by a hacker


planting a small chip in a legit credit card reader. chip records transaction data

dictionary attack

(aka direct harvesting attacks) use special software to guess addresses at a particular company and send blank email messages. those that don't come back are valid

Evil twin

when a hacker sets up a wireless network with the same name (SSID) as the wireless access point at a local hot spot

key logger

software records computer activity, user's keystrokes, emails sent/received..

logic and time bombs

Software that sits idle until a specified circumstance or time triggers it, destroying programs, data


malicious software

packet sniffing

find confidential information using a computer while it travels the internet and other networks


redirecting a web site's traffic to a fake web site to gain confidential information


a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail


attacking phone systems to obtain free phone line access; send viruses; access, steal and destroy data


three meanings: (1) clandestine use of a neighbor's wifi (2) tapping into telecom line and electronically latching on to a legitimate user and go with them into the system (3) unauthorized person passing through secure door when authorized person opens it


creating a seemingly legitimate business, collecting personal information to make a sale and never delivering a product


Acting under false pretenses to gain confidential information.


"Software that conceals processes, files, network connections, memory addresses, systems utility programs, and system data from the operating system."

salami technique

stealing tiny slices of money over time


double swiping a credit card in a legit terminal or on a side card reader to keep the information


unsolicited commercial e-mailing


spam blogs, promote affiliated websites to increase google PageRank (how often a web page is referenced by other web pages)


computer software that is designed to collect personal info about users without their informed consent


making an email message look as if someone else sent it


A method of hiding data within another media type, such as graphic, WAV file, or document


using special software to get past system controls and do illegal things

trap door

a way into a system that bypasses normal system controls.

trojan horse

Unauthorized code in an authorized and properly functioning program


voice phishing

war dialing

hackers search for dial-up modem lines by programming computers to dial thousands of phone lines

war driving

driving around looking for unprotected wireless networks


a software program capable of reproducing itself that can spread from one computer to the next over a network

Zero-day attack

An attack between the time a new software vulnerability is discovered and a software patch that fixes the problem is released

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording