Relier Pairs Hacks and AttacksVersion en ligne Match Name of the Attack to its definition par Deb Miles 1 Scareware 2 Skimming 3 Catfish 4 Keylogger 5 Phishing 6 Hash Busters 7 Whaling 8 Spear-phishing 9 Spoofing 10 Drive-By-Download 11 Ghosting 12 Vishing 13 Malvertising 14 Ransomware 15 Pharming 16 Brute Force Attack 17 Spyware 18 Smishing 19 Man-in-the-Middle Attack Secret interception and possible alteration of messages between two parties who believe they are securely communicating with each other. Online advertising that contains software intended to damage or disable computers. Malicious programs that route you to hackers own websites - often look-alikes of well known sites - even if you've correctly typed in the address of the site you want to visit. Phishing with personalized email - it looks like it's from someone you know. Use of a device that captures information from the magnetic stripe on credit and debit cards. The devices can be secretly installed on card-reading systems at gas pumps, ATMs and Store checkout counters. Theft of a deceased person's identity in order to open credit accounts or to get utility or medical services. When a scammer poses as a trusted business or other entity, to trick you into providing sensitive personal data or credit card accounts. A program that displays warnings about non-existent infections or viruses to trick you into installing malware or buying fake antivirus protection. The use of recorded phone messages intended to trick you into revealing sensitive information for identity theft. When a Virus is downloaded when you visit a compromised website - you don't even have to click on anything! Phishing attempts that go through your mobile device via text message, telling you to call a toll-free number. Random words or sentences in spam emails which allow the emails to bypass your spam filters. Malware that is installed on your computer or cellphone which tracks your actions and collects information without your knowledge. Someone who creates a fake online profile to intentionally deceive you. A hidden program that logs sequential strokes on your keyboard and sends them to hackers so they can figure out your login credentials. A program that disables your computer, hijacks and encrypts files, and then demands a fee to restore your files and functionality. Phishing which typically targets corporate executives or payroll departments, by a scammer who poses as its CEO, a company attorney or a vendor, in order to get payments or sensitive information Typically, the manipulation of your telephone's caller ID to display a false name or number (masquerading as a specific person, business or agency) Finds Passwords or keys by trying every possible combination until the correct one is found.