Guide to Common Scam and Fraud Terminology Malware Spyware

Guide to Common Scam and Fraud Terminology Malware Spyware

Guide to Common Scam and Fraud Terminology - Malware, Spyware Scams & Fraud

Glossary of Scam Terminology

Here s your guide to the common lingo of cutting-edge fraud

Back in simpler times, "skimming" involved a flat rock and a lake, "cramming" was what college students did before final exams or in telephone booths (remember them?), and "phishing" was a misspelled way to catch dinner. But scammer rip-offs rewrote those meanings. Here's a guide to the dialect of common types of computer-assisted deception (click on links for more details): Getty Images What's the difference between pharming and phishing? . A network of computers — maybe one of the machines is yours — that scammers have infected with hidden software to secretly send spam. . The illegal placement of unauthorized charges on your telephone bill for unrequested services or calls not made. . Someone who uses the Internet to illegally break into computers. Keystroke logger. A usually covert program that tracks (or logs) sequential strokes on your keyboard to allow remote hackers to capture your passwords and online banking and credit card information. . Short for "malicious software," this term means computer viruses and other types of programs that cybercriminals use to disrupt or access your computer, typically with the aim of gathering sensitive files and accounts.

Spot More Scams


Experts predict a surge in computer and cellphone scams
What you can do to avoid rising cellphone scams and fake text messages
Here's how to report it

— Receive access to exclusive information, benefits and discounts Pharming. When hackers use malicious programs to route you to their own sites — even though you've correctly typed in the address of a site you want to visit. The software stealthily diverts you to a look-alike destination, typically with the goal of gathering personal information for identity theft. . The use of authentic-looking emails, often purporting to be from a bank or government agency, to trick you into responding with sensitive personal data. . A malicious computer program that restricts or disables your computer and then demands, typically via a pop-up window, that you pay a fee to fix the problem. . A type of malware that displays on-screen warnings of nonexistent computer infections or generates constant pop-ups intended to trick you into buying useless or potentially dangerous "protection" software. . The capturing of information from the magnetic stripe on your ATM and credit card by use of portable "" devices that are secretly installed on card-reading machines. . Named for the SMS (short message service) technology used to send text messages, it means phishing attempts made on cellphones.

Speak Out

Run into a scam not mentioned here? Have additional tips other readers could use? Speak out on our . Spoofing. Any situation in which scammers masquerade as a specific person, business or agency. The term is typically used to describe the manipulation of to display a false name or number for the caller. . A type of malware installed on to track your actions and/or collect information without your knowledge. Some spyware can change computer settings for pharming redirection. . Software that's hidden within apparently harmless data — or masquerades as a regular program — and when activated, can deliver such blows as corrupting data on your hard drive or sending files and account information to hackers. Unlike viruses and worms, Trojans do not self-replicate and spread to other computers. . Short for "voice phishing," it's the use of recorded messages to telephones — usually claiming to be from a bank — with the goal of tricking you into revealing personal or account information for identity theft. . A computer program that can replicate itself and spread from computer to computer or file to file. It comes to life only when you take a specific action, such as running a particular program. . Like a virus, it can replicate itself and spread — but without any action by you. Sid Kirchheimer is the author of Scam-Proof Your Life, published by AARP Books/Sterling.

Also of Interest

Visit the for great deals and savings tips Cancel You are leaving AARP.org and going to the website of our trusted provider. The provider’s terms, conditions and policies apply. Please return to AARP.org to learn more about other benefits. Your email address is now confirmed. You'll start receiving the latest news, benefits, events, and programs related to AARP's mission to empower people to choose how they live as they age. You can also by updating your account at anytime. You will be asked to register or log in. Cancel Offer Details Disclosures

Close In the next 24 hours, you will receive an email to confirm your subscription to receive emails related to AARP volunteering. Once you confirm that subscription, you will regularly receive communications related to AARP volunteering. In the meantime, please feel free to search for ways to make a difference in your community at Javascript must be enabled to use this site. Please enable Javascript in your browser and try again.
Share:
0 comments

Comments (0)

Leave a Comment

Minimum 10 characters required

* All fields are required. Comments are moderated before appearing.

No comments yet. Be the first to comment!