Subscribe to our email alerts

Beyond the Transaction: Every Transaction Has a Story

Security Slang Everyone Should Know

Big data and cybersecurity have been hot topics this year and those IT security guys you once thought were geeky have reached a whole new level of cool – like ‘defender-of-the-weak’ cool. They are the silent, virtual warriors keeping our sensitive information secure.

To keep up with the new cool and their techie slang, we have put together a list that’s guaranteed to get you into the ‘in crowd’. Let’s start with the basics to ease you in.

Phishing – It sounds a lot like fishing because this deceptive practice is all about the “hook and reel”. Scammers send eemails purporting to be from reputable companies or a reliable source in an attempt to dupe individuals into revealing personal information, including at times bank details, logon identity, passwords and credit card numbers.

SMSishing – A phishing attempt made using an SMS text message.

Vishing – A phishing attempt made over the telephone.

Spearphishing – A phishing attempt directed at targeted individuals or companies that appear to come from trusted sources and seek unauthorized access to confidential data.

Clone phishing – A phishing attempt using a copied or cloned eemail appearing to be from the original sender and containing malware in an attachment or link.

Malware – A shortened word derived from the term “Malicious software” used to infiltrate private computer systems and gather sensitive information or cause disruption.

Skimming – The theft of credit or debit card information by electronic means with the intention to replicate these data in a transaction for fraudulent use.

ATM skimming – When a card reader or skimming device is disguised to resemble a genuine part of an ATM machine in order to steal card numbers and pin codes.

Card cloning – When a thief steals an individual’s payment card details and copies them onto a bogus ‘clone’ card.

Wardriving – The theft of financial data using a moving vehicle and a portable computer or mobile device to locate insecure wireless networks nearby.

Tsunami attack – A coordinated effort, often international, to simultaneously withdraw funds from multiple ATMs using cloned payment cards created from stolen card details.

Credit monitoring – Tools and services that monitor one’s credit history in order to detect any suspicious activity or changes.

Which slang caught your attention? Let us know in the comment box below!

To stay up to date on the latest news, subscribe to our Engagement Bureau or follow us on Twitter @MasterCardAP.