Relacionar Columnas Hacks and AttacksVersión en línea Match Name of the Attack to its definition por Deb Miles 1 Vishing 2 Brute Force Attack 3 Spoofing 4 Ransomware 5 Phishing 6 Scareware 7 Spyware 8 Whaling 9 Man-in-the-Middle Attack 10 Hash Busters 11 Catfish 12 Smishing 13 Keylogger 14 Pharming 15 Malvertising 16 Drive-By-Download 17 Ghosting 18 Spear-phishing 19 Skimming Secret interception and possible alteration of messages between two parties who believe they are securely communicating with each other. Malicious programs that route you to hackers own websites - often look-alikes of well known sites - even if you've correctly typed in the address of the site you want to visit. Random words or sentences in spam emails which allow the emails to bypass your spam filters. A hidden program that logs sequential strokes on your keyboard and sends them to hackers so they can figure out your login credentials. Phishing which typically targets corporate executives or payroll departments, by a scammer who poses as its CEO, a company attorney or a vendor, in order to get payments or sensitive information Typically, the manipulation of your telephone's caller ID to display a false name or number (masquerading as a specific person, business or agency) Someone who creates a fake online profile to intentionally deceive you. A program that displays warnings about non-existent infections or viruses to trick you into installing malware or buying fake antivirus protection. Theft of a deceased person's identity in order to open credit accounts or to get utility or medical services. Malware that is installed on your computer or cellphone which tracks your actions and collects information without your knowledge. Online advertising that contains software intended to damage or disable computers. Phishing with personalized email - it looks like it's from someone you know. A program that disables your computer, hijacks and encrypts files, and then demands a fee to restore your files and functionality. Finds Passwords or keys by trying every possible combination until the correct one is found. When a scammer poses as a trusted business or other entity, to trick you into providing sensitive personal data or credit card accounts. Use of a device that captures information from the magnetic stripe on credit and debit cards. The devices can be secretly installed on card-reading systems at gas pumps, ATMs and Store checkout counters. The use of recorded phone messages intended to trick you into revealing sensitive information for identity theft. Phishing attempts that go through your mobile device via text message, telling you to call a toll-free number. When a Virus is downloaded when you visit a compromised website - you don't even have to click on anything!