• Botnet – a network of software robots, or bots, that automatically spread malware
  • Fast Flux – moving data quickly among the computers in a botnet to make it difficult to trace the source of malware or phishing websites
  • Zombie Computer – a computer that has been hacked into and is used to launch malicious attacks or to become part of a botnet
  • Social Engineering – using lies and manipulation to trick people into revealing their personal information. Phishing is a form of social engineering
  • Denial-of-Service attacks – flooding a network or server with traffic in order to make it unavailable to its users
  • Skimmers – Devices that steal credit card information when the card is swiped through them. This can happen in stores or restaurants when the card is out of the owner’s view, and frequently the credit card information is then sold online through a criminal community.
  • Some identity thieves target organizations that store people’s personal information, like schools or credit card companies. But most cyber criminals will target home computers rather than trying to break into a big institution’s network because it’s much easier.



No responses yet

Leave a Reply

Your email address will not be published. Required fields are marked *