an attack that tricks a user into clicking a webpage element which is invisible or disguised as another element.
Clickjacking
15
It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
A worm
15
A user wants to complete a transaction in online banking. However, the user is redirected to a fake site that looks like the bank's website.
Pharming
15
A type of malware installed on your computer or mobile device without your consent. It can gain access to your sensitive personal information and then relay it to other parties
Spyware
15
a technique used to keep visitors from leaving their website, e. g. by launching an endless series of pop-up ads
Mousetrapping
15
a type of social engineering attack in which cyber criminals trick victims into handing over sensitive information or installing malware, usually via emails.
Phishing
15
unwanted software designed to throw advertisements up on your screen, most often within a web browser
Adware
15
a type of malware that downloads onto a computer disguised as a legitimate program
A Trojan Horse
15
A computer program that can copy itself and infect a computer without permission or knowledge of the user.
A virus
15
the use of works protected by copyright without permission for a usage where such permission is required
Piracy
15
a type of malicious software designed to block access to a computer system until a sum of money is paid
Ransomware
15
a type of monitoring software designed to record keystrokes made by a user.
Keylogger
15
Presenting someone else's work or ideas as your own