When any crime is committed over the internet it is referred to as a cybercrime. It’s good to understand and be aware of the different types of crimes out there so you can protect yourself and your company.
Malware:
Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system.
Virus:
Malware that copies itself and infects your computer and files and has a detrimental effect, such as corrupting the system or destroying data.
Hacking:
When someone breaks into a computer or network.
Ransomware:
Malware designed to block access to a computer system until a sum of money is paid.
Spyware:
Malware that gathers information about you, usually to track your internet use and deliver pop-up ads.
Trojan Horse:
Malicious software which is used to hack into a computer by misleading users of its true intent by pretending to be useful.
Pharming:
The fraudulent practice of directing internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc.
Social Engineering:
A type of confidence trick for the purpose of information gathering, fraud, or system access.
Rogue Security Software:
Malware that pretends to be malware removal software.
Keylogger:
Malware that records every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
Highjacker:
Hijackware is a type of malicious software that infects an internet browser in order to display advertising and/or redirect the user to malicious or spammy websites.
Password Stealer:
Malware specifically used to transmit personal information, such as usernames and passwords.
Backdoor:
Opens a backdoor into your computer to provide a connection for other malware, viruses, SPAM or hackers.
Rootkit:
Disguises itself as normal files that “hide in plain sight” so your antivirus software overlooks them. The goal is usually to steal the identity information from your computer, often to gain control of a system. It’s difficult to detect and remove.
Worm:
Malware that replicates itself in order to spread to other computers.
Phishing:
Is the attempt to obtain sensitive information, by disguising as a trustworthy entity in an email.
Spoofing:
When cybercriminals try to get into your computer by masquerading as a trusted source. Examples include email spoofing, IP spoofing and address bar spoofing.
Adware:
Adware is a type of malware that bombards you with endless ads and pop-ups.