24 terms
Cybercrime and cyber extortion terms
Cybercrime and cyber extortion describe criminal activity that relies on computer technology. Hackers, scammers, and other types of malicious actors use different cybercrime techniques to target individuals and corporations.
Wire transfer fraud
Wire transfer fraud is a type of scam where criminals deceive people into transferring them money via electronic means.
Wire fraud
Wire fraud is a criminal offense involving the use of electronic communication (e.g., phone calls, emails, or online messaging) to trick individuals for financial gain.
Vendor email compromise
Vendor email compromise (VEC) is a cyber scam where attackers target the email accounts of vendors and use them to send fake invoices to their customers.
Triangulation fraud
Triangulation fraud is an online scam involving three parties: an unsuspecting buyer, a genuine seller, and a fraudulent seller as a middleman.
Third-party fraud
Third-party fraud is when a fraudster steals someone's personal data or account details to make unauthorized transactions.
Skimming attack
A skimming attack is when cybercriminals gain unauthorized access to cardholders’ financial information through an EFTPOS terminal or an ATM.
Salami fraud
Salami fraud is the practice of stealing small amounts of money from a large number of accounts over a period of time.
Muling
Muling is the practice of using a third party (a “mule”) to move funds out of a compromised account.
Data diddling
Data diddling is a cybercrime where a person intentionally enters wrong information into a computer, system, or document.
Cybersquatting
Cybersquatting is the act of registering, using, or selling a domain name with the intention of profiting from someone else's trademark or reputation.
Cybercrime
Cybercrime is any criminal activity involving computers, computer networks, or networked devices.
Cyber extortion
Cyber extortion is blackmailing an individual or organization by threatening to release sensitive data or launch a cyberattack.
Cyber begging
Cyber begging is asking for financial help on the internet.
Cookie stuffing
Cookie stuffing is a deceptive technique used in affiliate marketing that involves placing tracking cookies onto a device without the user’s knowledge or consent.
Carding
Carding is a type of cybercrime where people use stolen credit card information to buy things or get into someone's financial accounts without permission.
Card testing
Card testing, also known as card checking, is a type of fraud where criminals try to see if stolen credit card information is still working.
Business email compromise
A business email compromise (BEC) is an email scam targeting businesses where a malicious party attempts to defraud the company.
BIN attack
In cybersecurity, the “Bank identification number attack” or “BIN attack” refers to when cybercriminals exploit the first six digits of a credit or debit card, also known as BIN, to identify the issuing bank and the card type.
Banker Trojan
Banker Trojan is a malicious computer program that allows attackers to access private users’ data that online banking platforms store and process.
Bank Drop
The term “Bank Drop” defines the action of receiving and laundering money using an existing and legitimate bank account.
ATM skimming
ATM skimming is a cybercrime in which criminals steal cardholders' data by attaching unauthorized devices to an automated teller machine (ATM).
ATM jackpotting
ATM jackpotting is a cyber attack in which an attacker forces an ATM to dispense large amounts of cash.
The importance of cybercrime and cyber extortion terminology
Understanding cybercrime and cyber extortion terminology can help users recognize, respond to, and prevent some of these threats before they cause significant financial, emotional, or even reputational damage.
Know what to do
The glossary contains extensive instructions on what to do when you’ve been exposed to the most common cybercrime cases or cyber extortion.
Understand how cybercrime works
Learning how malicious actors perform cyber extortion will prove useful when you’re looking for options on how to safeguard your device against ransomware and other cyberattacks.
Notice the threats before they occur
Understanding the most common warning signs of cybercrime and cyber extortion can help you limit the likelihood of bad actors stealing your money online.
Online security starts with a click.
Stay safe with the world’s leading VPN
Explore related glossary categories
Can’t find an answer to your question?
Ask the questions that matter to you — and get answers from our cybersecurity experts.