Table of Contents
142 relations: Adware, Amazon (company), Anti-Phishing Working Group, AOHell, AOL, Apple Inc., Australian Government, Bank of America, Barack Obama, Bill (law), Bitcoin, Black hat (computer security), Blacklist (computing), Brazil, Bundestag, California, CAN-SPAM Act of 2003, Catfishing, Christian Democratic Union of Germany, Citibank, Clickjacking, Computer virus, Computer worm, Connecticut, Cross-site scripting, Cursor (user interface), Cyscon, Darknet market, Duke University School of Law, E-gold, EarthLink, Educational game, Elon Musk, Email, Email filtering, Email spam, Exploit kit, Fake news, Fancy Bear, Federal Bureau of Investigation, Federal Trade Commission, Firefox, Firefox 2, Forbes, Frame (World Wide Web), Fraud Act 2006, FraudWatch International, GeoTrust, Google, Google Chrome, ... Expand index (92 more) »
- Identity theft
- Types of cyberattacks
Adware
Adware, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process.
Amazon (company)
Amazon.com, Inc., doing business as Amazon, is an American multinational technology company, engaged in e-commerce, cloud computing, online advertising, digital streaming, and artificial intelligence.
See Phishing and Amazon (company)
Anti-Phishing Working Group
The Anti-Phishing Working Group (APWG) is an international consortium that attempts to eliminate fraud and identity theft caused by phishing and related incidents It brings together businesses affected by phishing attacks: security products and service companies, law enforcement agencies, government agencies, trade associations, regional international treaty organizations, and communications companies. Phishing and Anti-Phishing Working Group are Spamming.
See Phishing and Anti-Phishing Working Group
AOHell
AOHell was a Windows application that was used to simplify 'cracking' (computer hacking) using AOL.
AOL
AOL (stylized as Aol., formerly a company known as AOL Inc. and originally known as America Online) is an American web portal and online service provider based in New York City, and a brand marketed by Yahoo! Inc. The service traces its history to an online service known as PlayNET.
See Phishing and AOL
Apple Inc.
Apple Inc. is an American multinational corporation and technology company headquartered in Cupertino, California, in Silicon Valley.
Australian Government
The Australian Government, also known as the Commonwealth Government or the Federal Government, is the national executive government of the Commonwealth of Australia, a federal parliamentary constitutional monarchy.
See Phishing and Australian Government
Bank of America
The Bank of America Corporation (often abbreviated BofA or BoA) is an American multinational investment bank and financial services holding company headquartered at the Bank of America Corporate Center in Charlotte, North Carolina, with investment banking and auxiliary headquarters in Manhattan.
See Phishing and Bank of America
Barack Obama
Barack Hussein Obama II (born August 4, 1961) is an American politician who served as the 44th president of the United States from 2009 to 2017.
Bill (law)
A bill is a proposal for a new law, or a proposal to significantly change an existing law.
Bitcoin
Bitcoin (abbreviation: BTC; sign: ₿) is the first decentralized cryptocurrency.
Black hat (computer security)
A black hat (black hat hacker or blackhat) is a computer hacker who violates laws or ethical standards for nefarious purposes, such as cybercrime, cyberwarfare, or malice. Phishing and black hat (computer security) are cybercrime.
See Phishing and Black hat (computer security)
Blacklist (computing)
In computing, a blacklist, disallowlist, blocklist, or denylist is a basic access control mechanism that allows through all elements (email addresses, users, passwords, URLs, IP addresses, domain names, file hashes, etc.), except those explicitly mentioned.
See Phishing and Blacklist (computing)
Brazil
Brazil, officially the Federative Republic of Brazil, is the largest and easternmost country in South America and Latin America.
Bundestag
The Bundestag ("Federal Diet") is the German federal parliament and the lower of two federal chambers, opposed to the upper chamber, the Bundesrat.
California
California is a state in the Western United States, lying on the American Pacific Coast.
CAN-SPAM Act of 2003
The Controlling the Assault of Non-Solicited Pornography And Marketing (CAN-SPAM) Act of 2003 is a law passed in 2003 establishing the United States' first national standards for the sending of commercial e-mail. Phishing and CAN-SPAM Act of 2003 are Spamming.
See Phishing and CAN-SPAM Act of 2003
Catfishing
Catfishing refers to the creation of a fictitious online persona, or fake identity (typically on social networking platforms), with the intent of deception, usually to mislead a victim into an online romantic relationship or to commit financial fraud. Phishing and Catfishing are deception.
Christian Democratic Union of Germany
The Christian Democratic Union of Germany (Christlich Demokratische Union Deutschlands; CDU) is a Christian democratic and conservative political party in Germany.
See Phishing and Christian Democratic Union of Germany
Citibank
Citibank, N.A. ("N. A." stands for "National Association"; stylized as citibank) is the primary U.S. banking subsidiary of financial services multinational Citigroup.
Clickjacking
Clickjacking (classified as a user interface redress attack or UI redressing) is a malicious technique of tricking a user into clicking on something different from what the user perceives, thus potentially revealing confidential information or allowing others to take control of their computer while clicking on seemingly innocuous objects, including web pages. Phishing and Clickjacking are social engineering (security).
Computer virus
A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. Phishing and computer virus are deception.
See Phishing and Computer virus
Computer worm
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.
See Phishing and Computer worm
Connecticut
Connecticut is the southernmost state in the New England region of the Northeastern United States.
Cross-site scripting
Cross-site scripting (XSS) is a type of security vulnerability that can be found in some web applications.
See Phishing and Cross-site scripting
Cursor (user interface)
In human–computer interaction, a cursor is an indicator used to show the current position on a computer monitor or other display device that will respond to input.
See Phishing and Cursor (user interface)
Cyscon
Cyscon is an IT consultancy with its main headquarters in Düsseldorf, Germany, founded by Thorsten Kraft and Thomas Wolf.
Darknet market
A darknet market is a commercial website on the dark web that operates via darknets such as Tor and I2P.
See Phishing and Darknet market
Duke University School of Law
Duke University School of Law is the law school of Duke University, a private research university in Durham, North Carolina.
See Phishing and Duke University School of Law
E-gold
e-gold was a digital gold currency operated by Gold & Silver Reserve Inc.
EarthLink
EarthLink is an American Internet service provider.
Educational game
Educational games are games explicitly designed with educational purposes, or which have incidental or secondary educational value.
See Phishing and Educational game
Elon Musk
Elon Reeve Musk (born June 28, 1971) is a businessman and investor known for his key roles in space company SpaceX and automotive company Tesla, Inc. Other involvements include ownership of X Corp., the company that operates the social media platform X (formerly known as Twitter), and his role in the founding of The Boring Company, xAI, Neuralink and OpenAI.
Electronic mail (email or e-mail) is a method of transmitting and receiving messages using electronic devices. Phishing and Email are internet terminology.
Email filtering
Email filtering is the processing of email to organize it according to specified criteria. Phishing and email filtering are Spamming.
See Phishing and Email filtering
Email spam
Email spam, also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email (spamming). Phishing and email spam are Spamming.
Exploit kit
An exploit kit is a tool used for automatically managing and deploying exploits against a target computer.
Fake news
Fake news or information disorder is false or misleading information (misinformation, including disinformation, propaganda, and hoaxes) presented as news. Phishing and Fake news are confidence tricks, deception, fraud and social engineering (security).
Fancy Bear
Fancy Bear is a Russian cyber espionage group.
Federal Bureau of Investigation
The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency.
See Phishing and Federal Bureau of Investigation
Federal Trade Commission
The Federal Trade Commission (FTC) is an independent agency of the United States government whose principal mission is the enforcement of civil (non-criminal) antitrust law and the promotion of consumer protection.
See Phishing and Federal Trade Commission
Firefox
Mozilla Firefox, or simply Firefox, is a free and open source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation.
Firefox 2
Mozilla Firefox 2 is a version of Firefox, a web browser released on October 24, 2006 by the Mozilla Corporation.
Forbes
Forbes is an American business magazine founded by B. C. Forbes in 1917 and owned by Hong Kong-based investment group Integrated Whale Media Investments since 2014.
Frame (World Wide Web)
In the context of a web browser, a frame is a part of a web page or browser window which displays content independent of its container, with the ability to load content independently.
See Phishing and Frame (World Wide Web)
Fraud Act 2006
The Fraud Act 2006 (c 35) is an Act of the Parliament of the United Kingdom which affects England and Wales and Northern Ireland.
See Phishing and Fraud Act 2006
FraudWatch International
FraudWatch International Pty Ltd. is an internet security organization that was founded in 2003 by Trent Youl and mainly specializes in online fraud protection and anti-phishing activities. Phishing and FraudWatch International are confidence tricks, cybercrime, identity theft, organized crime activity and social engineering (security).
See Phishing and FraudWatch International
GeoTrust
GeoTrust is a digital certificate provider.
Google LLC is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial intelligence (AI).
Google Chrome
Google Chrome is a web browser developed by Google.
See Phishing and Google Chrome
Google Safe Browsing
Google Safe Browsing is a service from Google that warns users when they attempt to navigate to a dangerous website or download dangerous files.
See Phishing and Google Safe Browsing
Hillary Clinton
Hillary Diane Rodham Clinton (Rodham; born October 26, 1947) is an American politician and diplomat who served as the 67th United States secretary of state in the administration of Barack Obama from 2009 to 2013, as a U.S. senator representing New York from 2001 to 2009, and as the first lady of the United States to former president Bill Clinton from 1993 to 2001.
See Phishing and Hillary Clinton
Hillary Clinton 2016 presidential campaign
The 2016 presidential campaign of Hillary Clinton was announced in a YouTube video on April 12, 2015.
See Phishing and Hillary Clinton 2016 presidential campaign
Hosts (file)
The computer file hosts is an operating system file that maps hostnames to IP addresses.
Hyperlink
In computing, a hyperlink, or simply a link, is a digital reference to data that the user can follow or be guided to by clicking or tapping.
ICANN
The Internet Corporation for Assigned Names and Numbers (ICANN) is a global multistakeholder group and nonprofit organization headquartered in the United States responsible for coordinating the maintenance and procedures of several databases related to the namespaces and numerical spaces of the Internet, ensuring the Internet's stable and secure operation.
Identity theft
Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. Phishing and identity theft are fraud and organized crime activity.
See Phishing and Identity theft
IDN homograph attack
The internationalized domain name (IDN) homograph attack is a way a malicious party may deceive computer users about what remote system they are communicating with, by exploiting the fact that many different characters look alike (i.e., they are homographs, hence the term for the attack, although technically homoglyph is the more accurate term for different characters that look alike). Phishing and IDN homograph attack are deception.
See Phishing and IDN homograph attack
Information security
Information security, sometimes shortened to infosec, is the practice of protecting information by mitigating information risks.
See Phishing and Information security
Information sensitivity
Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security if disclosed to others.
See Phishing and Information sensitivity
Instant messaging
Instant messaging (IM) technology is a type of online chat allowing immediate transmission of messages over the Internet or another computer network.
See Phishing and Instant messaging
Internal Revenue Service
The Internal Revenue Service (IRS) is the revenue service for the United States federal government, which is responsible for collecting U.S. federal taxes and administering the Internal Revenue Code, the main body of the federal statutory tax law.
See Phishing and Internal Revenue Service
International Business Times
The International Business Times is an American online newspaper that publishes five national editions in four languages.
See Phishing and International Business Times
Internationalized domain name
An internationalized domain name (IDN) is an Internet domain name that contains at least one label displayed in software applications, in whole or in part, in non-Latin script or alphabet or in the Latin alphabet-based characters with diacritics or ligatures.
See Phishing and Internationalized domain name
Internet Crime Complaint Center
The Internet Crime Complaint Center (IC3) is a division of the Federal Bureau of Investigation (FBI) concerning suspected Internet-facilitated criminal activity.
See Phishing and Internet Crime Complaint Center
Internet Explorer
Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated as IE or MSIE) is a retired series of graphical web browsers developed by Microsoft that were used in the Windows line of operating systems.
See Phishing and Internet Explorer
Internet Explorer 7
Windows Internet Explorer 7 (IE7) (codenamed Rincon) is a web browser for Windows.
See Phishing and Internet Explorer 7
Joe Biden
Joseph Robinette Biden Jr. (born November 20, 1942) is an American politician who is the 46th and current president of the United States since 2021.
John Doe
John Doe (male) and Jane Doe (female) are multiple-use placeholder names that are used in the United States when the true name of a person is unknown or is being intentionally concealed.
Link farm
On the World Wide Web, a link farm is any group of websites that all hyperlink to other sites in the group for the purpose of increasing SEO rankings. Phishing and link farm are Spamming.
Logo
A logo (abbreviation of logotype) is a graphic mark, emblem, or symbol used to aid and promote public identification and recognition.
Machine learning
Machine learning (ML) is a field of study in artificial intelligence concerned with the development and study of statistical algorithms that can learn from data and generalize to unseen data and thus perform tasks without explicit instructions.
See Phishing and Machine learning
Mail and wire fraud
Mail fraud and wire fraud are terms used in the United States to describe the use of a physical (e.g., the U.S. Postal Service) or electronic (e.g., a phone, a telegram, a fax, or the Internet) mail system to defraud another, and are U.S. federal crimes. Phishing and mail and wire fraud are fraud and organized crime activity.
See Phishing and Mail and wire fraud
Malware
Malware (a portmanteau of malicious software)Tahir, R. (2018). Phishing and Malware are cybercrime.
Microsoft
Microsoft Corporation is an American multinational corporation and technology company headquartered in Redmond, Washington.
Mousetrapping
Mousetrapping is a technique that prevents users from exiting a website through standard means. Phishing and Mousetrapping are internet terminology.
See Phishing and Mousetrapping
MPack (software)
In computer security, MPack is a PHP-based malware kit produced by Russian crackers. Phishing and MPack (software) are cybercrime.
See Phishing and MPack (software)
Multi-factor authentication
Multi-factor authentication (MFA; two-factor authentication, or 2FA, along with similar terms) is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism.
See Phishing and Multi-factor authentication
Mutual authentication
Mutual authentication or two-way authentication (not to be confused with two-factor authentication) refers to two parties authenticating each other at the same time in an authentication protocol.
See Phishing and Mutual authentication
Natural language processing
Natural language processing (NLP) is an interdisciplinary subfield of computer science and artificial intelligence.
See Phishing and Natural language processing
Nordea
Nordea Bank Abp, commonly referred to as Nordea, is a Nordic financial services group operating in northern Europe with headquarters in Helsinki, Finland.
Opera (web browser)
Opera is a multi-platform web browser developed by its namesake company Opera.
See Phishing and Opera (web browser)
Operating system
An operating system (OS) is system software that manages computer hardware and software resources, and provides common services for computer programs.
See Phishing and Operating system
Optical character recognition
Optical character recognition or optical character reader (OCR) is the electronic or mechanical conversion of images of typed, handwritten or printed text into machine-encoded text, whether from a scanned document, a photo of a document, a scene photo (for example the text on signs and billboards in a landscape photo) or from subtitle text superimposed on an image (for example: from a television broadcast).
See Phishing and Optical character recognition
Organized crime
Organized crime is a category of transnational, national, or local group of centralized enterprises run to engage in illegal activity, most commonly for profit.
See Phishing and Organized crime
Parking violation
A parking violation is the act of parking a motor vehicle in a restricted place or in an unauthorized manner.
See Phishing and Parking violation
Password
A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity.
Patrick Leahy
Patrick Joseph Leahy, (born March 31, 1940) is an American politician and attorney who represented Vermont in the United States Senate from 1975 to 2023.
See Phishing and Patrick Leahy
PayPal
PayPal Holdings, Inc. is an American multinational financial technology company operating an online payments system in the majority of countries that support online money transfers; it serves as an electronic alternative to traditional paper methods such as checks and money orders.
Personal data
Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person.
See Phishing and Personal data
PhishTank
PhishTank is an anti-phishing site. Phishing and PhishTank are cybercrime.
Privacy
Privacy is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
QR code
A QR code (quick-response code) is a type of two-dimensional matrix barcode, invented in 1994, by Japanese company Denso Wave for labelling automobile parts.
Ransomware
Ransomware is a type of cryptovirological malware that permanently blocks access to the victim's personal data unless a "ransom" is paid.
RSA (cryptosystem)
RSA (Rivest–Shamir–Adleman) is a public-key cryptosystem, one of the oldest widely used for secure data transmission.
See Phishing and RSA (cryptosystem)
Saarland
Saarland (Sarre) is a state of Germany in the southwest of the country.
Safari (web browser)
Safari is a web browser developed by Apple.
See Phishing and Safari (web browser)
Sahra Wagenknecht
Sahra Wagenknecht (born Sarah Wagenknecht;; 16 July 1969) is a German politician, economist, author, and publicist.
See Phishing and Sahra Wagenknecht
Scam
A scam, or a confidence trick, is an attempt to defraud a person or group after first gaining their trust. Phishing and scam are confidence tricks, fraud and organized crime activity.
Security hacker
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Phishing and security hacker are identity theft.
See Phishing and Security hacker
September 11 attacks
The September 11 attacks, commonly known as 9/11, were four coordinated Islamist terrorist suicide attacks carried out by al-Qaeda against the United States in 2001.
See Phishing and September 11 attacks
Shuman Ghosemajumder
Shuman Ghosemajumder (born 1974) is a Canadian technologist, entrepreneur, and author.
See Phishing and Shuman Ghosemajumder
Simulated phishing
Simulated phishing or a phishing test is where deceptive emails, similar to malicious emails, are sent by an organization to their own staff to gauge their response to phishing and similar email attacks. Phishing and Simulated phishing are cybercrime, identity theft and social engineering (security).
See Phishing and Simulated phishing
SiteKey
SiteKey is a web-based security system that provides one type of mutual authentication between end-users and websites.
Smart card
A smart card (SC), chip card, or integrated circuit card (ICC or IC card), is a card used to control access to a resource.
Smartphone
A smartphone, often simply called a phone, is a mobile device that combines the functionality of a traditional mobile phone with advanced computing capabilities.
SMS
Short Message Service, commonly abbreviated as SMS, is a text messaging service component of most telephone, Internet and mobile device systems.
See Phishing and SMS
Social engineering (security)
In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. Phishing and social engineering (security) are confidence tricks, cybercrime and deception.
See Phishing and Social engineering (security)
Social networking service
A social networking service (SNS), or social networking site, is a type of online social media platform which people use to build social networks or social relationships with other people who share similar personal or career content, interests, activities, backgrounds or real-life connections.
See Phishing and Social networking service
Speech synthesis
Speech synthesis is the artificial production of human speech.
See Phishing and Speech synthesis
Subdomain
In the Domain Name System (DNS) hierarchy, a subdomain is a domain that is a part of another (main) domain.
Target Corporation
Target Corporation is an American retail corporation that operates a chain of discount department stores and hypermarkets, headquartered in Minneapolis, Minnesota.
See Phishing and Target Corporation
The Left (Germany)
The Left (Die Linke), commonly referred to as the Left Party (Die Linkspartei), is a democratic socialist political party in Germany.
See Phishing and The Left (Germany)
The Mercury News
The Mercury News (formerly San Jose Mercury News, often locally known as The Merc) is a morning daily newspaper published in San Jose, California, in the San Francisco Bay Area.
See Phishing and The Mercury News
The Pentagon
The Pentagon is the headquarters building of the United States Department of Defense, in Arlington County, Virginia, across the Potomac River from Washington, D.C. The building was constructed on an accelerated schedule during World War II.
The Washington Post
The Washington Post, locally known as "the Post" and, informally, WaPo or WP, is an American daily newspaper published in Washington, D.C., the national capital.
See Phishing and The Washington Post
The Web Conference
The ACM Web Conference (formerly known as International World Wide Web Conference, abbreviated as WWW) is a yearly international academic conference on the topic of the future direction of the World Wide Web.
See Phishing and The Web Conference
Transport Layer Security
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network.
See Phishing and Transport Layer Security
Trojan horse (computing)
In computing, a Trojan horse (or simply Trojan) is any malware that misleads users of its true intent by disguising itself as a standard program. Phishing and Trojan horse (computing) are social engineering (security).
See Phishing and Trojan horse (computing)
TrustRank
TrustRank is an algorithm that conducts link analysis to separate useful webpages from spam and helps search engine rank pages in SERPs (Search Engine Results Pages).
X, commonly referred to by its former name Twitter, is a social networking service.
Typosquatting
Typosquatting, also called URL hijacking, a sting site, a cousin domain, or a fake URL, is a form of cybersquatting, and possibly brandjacking which relies on mistakes such as typos made by Internet users when inputting a website address into a web browser. Phishing and Typosquatting are cybercrime.
See Phishing and Typosquatting
United Kingdom
The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of the continental mainland.
See Phishing and United Kingdom
United States
The United States of America (USA or U.S.A.), commonly known as the United States (US or U.S.) or America, is a country primarily located in North America.
See Phishing and United States
United States Congress
The United States Congress, or simply Congress, is the legislature of the federal government of the United States.
See Phishing and United States Congress
United States District Court for the Western District of Washington
The United States District Court for the Western District of Washington (in case citations, W.D. Wash.) is the federal district court whose jurisdiction comprises the following counties of the state of Washington: Clallam, Clark, Cowlitz, Grays Harbor, Island, Jefferson, King, Kitsap, Lewis, Mason, Pacific, Pierce, San Juan, Skagit, Skamania, Snohomish, Thurston, Wahkiakum, and Whatcom.
See Phishing and United States District Court for the Western District of Washington
United States Secret Service
The United States Secret Service (USSS or Secret Service) is a federal law enforcement agency under the Department of Homeland Security with the purpose of conducting investigations into currency and financial-payment crime, and protecting U.S. political leaders, their families, and visiting heads of state or government.
See Phishing and United States Secret Service
URL
A uniform resource locator (URL), colloquially known as an address on the Web, is a reference to a resource that specifies its location on a computer network and a mechanism for retrieving it.
See Phishing and URL
URL redirection
URL redirection, also called URL forwarding, is a World Wide Web technique for making a web page available under more than one URL address. Phishing and URL redirection are internet terminology and Spamming.
See Phishing and URL redirection
Utica University
Utica University is a private university in Utica, New York.
See Phishing and Utica University
Virus hoax
A computer virus hoax is a message warning the recipients of a non-existent computer virus threat.
Voice over IP
Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for voice calls for the delivery of voice communication sessions over Internet Protocol (IP) networks, such as the Internet.
See Phishing and Voice over IP
Warez
Warez is a common computing and broader cultural term referring to pirated software (i.e. illegally copied, often after deactivation of anti-piracy measures) that is distributed via the Internet.
Warez scene
The Warez scene, often referred to as The Scene, is a worldwide, underground, organized network of pirate groups specializing in obtaining and illegally releasing digital media for free before their official sale date.
Watering hole attack
Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware.
See Phishing and Watering hole attack
WebAuthn
Web Authentication (WebAuthn) is a web standard published by the World Wide Web Consortium (W3C).
Whitelist
A whitelist is a list or register of entities that are being provided a particular privilege, service, mobility, access or recognition. Phishing and whitelist are Spamming.
Witness summons
A subpoena (also subpœna, supenna or subpena) or witness summons is a writ issued by a government agency, most often a court, to compel testimony by a witness or production of evidence under a penalty for failure.
See Phishing and Witness summons
World Anti-Doping Agency
The World Anti-Doping Agency (WADA; Agence mondiale antidopage, AMA) is a foundation initiated by the International Olympic Committee based in Canada to promote, coordinate, and monitor the fight against drugs in sports.
See Phishing and World Anti-Doping Agency
Young Union
The Junge Union Deutschlands (English: Young Union of Germany) or JU is the joint youth organisation of the CDU/CSU coalition in Germany.
2016–2021 literary phishing thefts
Between 2016 and 2021, multiple prepublication manuscripts were stolen via a phishing scheme that investigators believed were conducted by an industry insider or insiders. Phishing and 2016–2021 literary phishing thefts are fraud.
See Phishing and 2016–2021 literary phishing thefts
2600: The Hacker Quarterly
2600: The Hacker Quarterly is an American seasonal publication of technical information and articles, many of which are written and submitted by the readership, on a variety of subjects including hacking, telephone switching systems, Internet protocols and services, as well as general news concerning the computer "underground." With origins in the phone phreaking community and late 20th-century counterculture, 2600 and its associated conference transitioned to coverage of modern hacker culture, and the magazine has become a platform for speaking out against increased digital surveillance and advocacy of personal and digital freedoms.
See Phishing and 2600: The Hacker Quarterly
See also
Identity theft
- ATM looting
- AllClear ID
- Brandjacking
- Carding (fraud)
- Charles Stopford
- Code Shikara
- Credit card fraud
- Credit freeze
- Deepfakes
- Digital cloning
- Facilitated communication
- FraudWatch International
- Gene theft
- Ghosting (identity theft)
- Hamza Bendelladj
- Hieu Minh Ngo
- Identity Theft Resource Center
- Identity fraud
- Identity theft
- Identity theft in the United States
- Internet fraud
- Levels of identity security
- LifeLock
- List of data breaches
- List of phishing incidents
- List of spyware programs
- Phishing
- RFID skimming
- Red Flags Rule
- Security hacker
- Simulated phishing
- Spyware
- The Riches
- Trusona
- Wireless identity theft
Types of cyberattacks
- ARP spoofing
- Bitsquatting
- Carding (fraud)
- Cybersquatting
- DNS spoofing
- Data breaches
- Denial-of-service attack
- Denial-of-service attacks
- Directory harvest attack
- Email fraud
- Email spoofing
- IP address spoofing
- Joanap
- LAND
- List of phishing incidents
- Lottery scam
- MAC spoofing
- Phishing
- Referer spoofing
- Rogue DHCP
- Scam baiting
- Spoofing attack
- Web skimming
References
Also known as 302 Google Jacking, Anti phishing, Anti-phishing, Antiphishing, Clone phishing, Covert Redirect, Fake login pages, Fake password reset email, Fake websites, Page hijacking, Pagejacking, Password phishing, Persistent Spear Phishing, Pfishing, Phished, Phisher, Phisherman, Phishers, Phishin, Phishing Scams, Phishing attack, Phishing countermeasures, Phishing detection, Phishing scam, Phishing site, Phising, Quishing, Rogue Web site, Rogue site, SMS phishing, SMiShing, Scam Messages, Smshing, Spear Phishing, Spear-Phishing, Spearphish, Spearphishing, Web page hijacking, Webpage hijacking, Website forgery, Whale Phishing.