All > Technology > Security > Identity Theft
In our context, it is also known as a “spam trap”. We have thousands of domains which accept all email sent to them, with the express purpose of capturing as much email as possible. We publish email addresses on high-visibility websites, in order to get on the perpetrators’ email lists, so that they will send us their phishing messages, which we can then take down.
- Browse Related Terms: Honey Pot, Malware, Phishing, SMShing, Spear Phishing, Vishing
All > Technology > Security > Identity Theft
A piece of code – either on a webpage, in an email attachment, or an application – that performs actions that the user did not agree to. These actions typically involve providing access to the user’s computer by the perpetrators, logging keystrokes, or redirecting internet traffic.
- Browse Related Terms: Honey Pot, Malware, Phishing, SMShing, Spear Phishing, Vishing
Also listed in:
- All > Technology > Security
All > Technology > Security > Identity Theft
A scam that involves tricking someone into giving up personal information, such as account passwords or SSN/SIN numbers, to be used to commit fraud. This fraud can range from draining a bank account, to complete identity takeover. Typically this type of scam is executed by creating a fake email, which leads the user to a fake-but-official-looking webpage.
- Browse Related Terms: Honey Pot, Malware, Phishing, SMShing, Spear Phishing, Vishing
Also listed in:
All > Technology > Security > Identity Theft
All > Technology > Security > Identity Theft
All > Technology > Security > Identity Theft