RAM scraping or storage scanning software: | malicious code that scans for sensitive data |
Data harvesters: | cyber criminals who infiltrate systems and collect data for illegal resale |
Cash-out fraudsters: | criminals that purchase assets from data harvesters to be used for illegal financial gain. They might buy goods with stolen credit cards or create false accounts |
Botnets: | Surreptitiously infiltrated computers |
DDoS Distributed denial of security attacks: | shutting down websites with a crushing load of seemingly legitimate requests |
Hackers: | someone who breaks into computer systems |
White hat hackers: | Uncover computer weaknesses without exploiting them. |
Black hat hackers: | computer criminals who exploit a system's weakness for personal gain. |
Hactivists: | infiltrate a system and exposing information as a protest seeking to make a political point |
Griefers or Trolls: | malicious pranksters |
Bad Apples: | rogue employees who steal secrets, install malware, or hold a firm hostage |
Social engineering: | con games that trick employees into revealing information or performing other tasks that comprise a firm |
Phishing: | cons executed technology in order to: acquire sensitive information, trick someone into installing malicious software |
Spoofed: | emails transmissions |
Zero-Day Exploits: | new attacks that haven't been clearly identified and haven't' been incorporated into security screening systems |
Malware: | seeks to comprise a computing systems without permission |
Viruses: | infect other software or files |
Worms: | take advantages of security vulnerability to automatically spread |
Trojans: | attempt to sneak in by masquerading as something they're not. |
Botnets or Zombie networks: | used in click fraud in sending spam to decipher accounts that use CAPTHAS |
CAPTHAS: | scrambled character images to thwart automated account setup or ticket buying attempts |
Screen capture: | records pixels that appear on a users screen to identify proprietary information |