At a recent conference, a staffer in attendance was given a cyber-crimes quiz to see if she could match up the name of the cyber-crime to the definition. She brought the quiz back home to test out the knowledge of the other staffers here at your BBB, and we thought we would also share this knowledge with you. Below are the names of several cyber-crimes. Can you match them to their description? We’ll bring you the answers next Friday and some tips to help you avoid being a victim of one of the schemes below. Good luck!
1. Email Spoofing
5. Keystroke Phishing
6. Identity Theft
7. Spear Phishing
8. Cookie Poisoning
12. Pod Slurping
a. When a Trojan program is unknowingly downloaded onto your computer that tracks the keystrokes you enter into the computer and sends it back to the schemer, who hopes to get a username and password from it.
b. A fake version of a real organizations website. The address bar can be altered so it appears to be the official website.
c. Software that is downloaded onto a user’s computer without his knowledge and used for malevolent purposes.
d. Stealing data b use of iPods or downloading malicious software via iPods.
e. A scam where an official looking email is sent to an unsuspecting user to try to trick them out of their username, password or other information. They are usually directed to click onto a link that goes to a fake version of a real organization’s website.
f. The practice of driving around in a vehicle with a Wi-Fi enabled laptop looking for available signals to use.
g. The modification of cookies that are put on your computer by an attacker to gain information about a user.
h. Changing the email header so it looks like it’s coming from someone else. This is also used to try to trick people into giving out personal information and is illegal under the CAN-SPAM Act.
i. Personalized phishing
j. The malicious software that is developed for the purpose of doing harm.
k. Short for “voice phishing” and is the latest scam. Starts with an email or phone call asking you to verify the last three digits of your credit card number to verify who you are.
l. A person gathers your personal information and poses as you to get credit, merchandise, services or to commit other crimes.
m. A crime where the attacker harasses the victim using electronic communication such as email, IM’s, chat rooms, discussion groups, etc.