Matching Pairs Hacks and AttacksOnline version Match Name of the Attack to its definition by Deb Miles 1 Phishing 2 Spyware 3 Ghosting 4 Malvertising 5 Skimming 6 Scareware 7 Keylogger 8 Drive-By-Download 9 Man-in-the-Middle Attack 10 Whaling 11 Ransomware 12 Pharming 13 Catfish 14 Spear-phishing 15 Vishing 16 Smishing 17 Spoofing 18 Brute Force Attack 19 Hash Busters A program that disables your computer, hijacks and encrypts files, and then demands a fee to restore your files and functionality. Phishing which typically targets corporate executives or payroll departments, by a scammer who poses as its CEO, a company attorney or a vendor, in order to get payments or sensitive information When a Virus is downloaded when you visit a compromised website - you don't even have to click on anything! When a scammer poses as a trusted business or other entity, to trick you into providing sensitive personal data or credit card accounts. Someone who creates a fake online profile to intentionally deceive you. A program that displays warnings about non-existent infections or viruses to trick you into installing malware or buying fake antivirus protection. Malicious programs that route you to hackers own websites - often look-alikes of well known sites - even if you've correctly typed in the address of the site you want to visit. The use of recorded phone messages intended to trick you into revealing sensitive information for identity theft. Secret interception and possible alteration of messages between two parties who believe they are securely communicating with each other. Online advertising that contains software intended to damage or disable computers. Phishing attempts that go through your mobile device via text message, telling you to call a toll-free number. Random words or sentences in spam emails which allow the emails to bypass your spam filters. Theft of a deceased person's identity in order to open credit accounts or to get utility or medical services. Phishing with personalized email - it looks like it's from someone you know. A hidden program that logs sequential strokes on your keyboard and sends them to hackers so they can figure out your login credentials. Finds Passwords or keys by trying every possible combination until the correct one is found. Typically, the manipulation of your telephone's caller ID to display a false name or number (masquerading as a specific person, business or agency) Use of a device that captures information from the magnetic stripe on credit and debit cards. The devices can be secretly installed on card-reading systems at gas pumps, ATMs and Store checkout counters. Malware that is installed on your computer or cellphone which tracks your actions and collects information without your knowledge.