A user wants to complete a transaction in online banking. However, the user is redirected to a fake site that looks like the bank's website.
Pharming
an attack that tricks a user into clicking a webpage element which is invisible or disguised as another element.
Clickjacking
a type of social engineering attack in which cyber criminals trick victims into handing over sensitive information or installing malware, usually via emails.
Phishing
Presenting someone else's work or ideas as your own
Plagiarism
a type of malware that downloads onto a computer disguised as a legitimate program
A Trojan Horse
A type of malware installed on your computer or mobile device without your consent. It can gain access to your sensitive personal information and then relay it to other parties
Spyware
a type of monitoring software designed to record keystrokes made by a user.
Keylogger
the use of works protected by copyright without permission for a usage where such permission is required
Piracy
It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
A worm
a technique used to keep visitors from leaving their website, e. g. by launching an endless series of pop-up ads
Mousetrapping
A computer program that can copy itself and infect a computer without permission or knowledge of the user.
A virus
a type of malicious software designed to block access to a computer system until a sum of money is paid
Ransomware
unwanted software designed to throw advertisements up on your screen, most often within a web browser
Adware
Your experience on this site will be improved by allowing cookies.