Glossar

A B C D E F G H I K M P R S T V Z

Skimming

Skimming refers to a criminal technique in which criminals electronically steal data from bank cards in order to later make unauthorized withdrawals or purchases with these cards. Skimming can be carried out in a number of ways, but typically criminals … Read More

Smishing

Smishing is a term made up of the words “SMS” and “phishing” and refers to a form of fraud in which criminals attempt to steal personal data from unsuspecting users by sending fake SMS messages. Typically, a smishing message contains … Read More

Social engineering

Social engineering is a method of fraud or manipulation that aims to exploit human weaknesses and behaviors to gain access to information or resources that are not normally accessible. The term refers to the use of social interactions and relationships … Read More

Spam

Spam is a term that refers to unwanted and unsolicited messages that are distributed via various digital communication channels such as email, SMS, social media and instant messaging services. These messages are often sent by senders trying to promote a … Read More

Spear phishing

  Spear Phishing ist eine Form des Phishings, bei der Angreifer gezielte E-Mails an Einzelpersonen oder Unternehmen senden, um vertrauliche Informationen zu sammeln oder Schadsoftware zu verbreiten. Im Gegensatz zu herkömmlichem Phishing, das breit gestreut und zufällig ist, zielt Spear … Read More

Spoofing

Spoofing is a technique in which an attacker attempts to impersonate another person, machine or entity in order to gain unauthorized access to systems or data or to carry out malicious activities. Various methods can be used in spoofing to … Read More

Spyware

Spyware is a type of software that is secretly installed on a computer or mobile device to monitor user behavior and collect information. Spyware can enter a system in a number of ways, including downloads from infected websites, email attachments … Read More

SQL injection

SQL injection (SQLi) is an attack technique in which attackers exploit a vulnerability in the database query of a web application to inject malicious SQL commands. These commands allow the attacker to gain access to confidential data, manipulate or delete … Read More