Big data and cybersecurity have been hot topics this year and those IT security guys you once thought were geeky have reached a whole new level of cool – like ‘defender-of-the-weak’ cool. They are the silent, virtual warriors keeping our sensitive information secure.
To keep up with the new cool and their techie slang, we have put together a list that’s guaranteed to get you into the ‘in crowd’. Let’s start with the basics to ease you in.
Phishing – It sounds a lot like fishing because this deceptive practice is all about the “hook and reel”. Scammers send eemails purporting to be from reputable companies or a reliable source in an attempt to dupe individuals into revealing personal information, including at times bank details, logon identity, passwords and credit card numbers.
SMSishing – A phishing attempt made using an SMS text message.
Vishing – A phishing attempt made over the telephone.
Spearphishing – A phishing attempt directed at targeted individuals or companies that appear to come from trusted sources and seek unauthorized access to confidential data.
Clone phishing – A phishing attempt using a copied or cloned eemail appearing to be from the original sender and containing malware in an attachment or link.
Malware – A shortened word derived from the term “Malicious software” used to infiltrate private computer systems and gather sensitive information or cause disruption.
Skimming – The theft of credit or debit card information by electronic means with the intention to replicate these data in a transaction for fraudulent use.
ATM skimming – When a card reader or skimming device is disguised to resemble a genuine part of an ATM machine in order to steal card numbers and pin codes.
Card cloning – When a thief steals an individual’s payment card details and copies them onto a bogus ‘clone’ card.
Wardriving – The theft of financial data using a moving vehicle and a portable computer or mobile device to locate insecure wireless networks nearby.
Tsunami attack – A coordinated effort, often international, to simultaneously withdraw funds from multiple ATMs using cloned payment cards created from stolen card details.
Credit monitoring – Tools and services that monitor one’s credit history in order to detect any suspicious activity or changes.
Which slang caught your attention? Let us know in the comment box below!