Identity theft
Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information, such as Social Security or driver's license numbers, in order to impersonate someone else.
Keystroke logger
A keylogger or keystroke logger is a type of software that tracks or logs the keys struck on your keyboard, typically in a covert manner so that you don’t know that your actions are being monitored.
Malware
software that is intended to damage or disable computers and computer systems.
Password manager
A password manager application supports centralized secure storage of passwords and helps manage using unique passwords across each site.
Phishing
The fraudulent practice of sending emails purporting to be from reputable companies in order to get individuals to reveal personal information, such as passwords and credit card numbers.
Ransomware
A type of malicious software designed to block access to a computer system until a sum of money is paid.
Social engineering
The use of deception to manipulate someone into giving away confidential or personal information that may be used for fraud.
Shoulder surfing
Spying on the user of an ATM, computer, or other electronic device in order to obtain their personal access information.
Spyware
Spyware is software that enables a user to obtain covert information about another's computer activities by transmitting data.
Vishing
making phone calls or leaving voice messages supposedly from reputable companies in order to get people to reveal their personal information, such as bank details and credit card numbers.
VPN (Virtual Private Network)
A VPN creates a virtual encrypted tunnel between you and a remote server operated by a VPN service. All external internet traffic is routed through this tunnel, so your data is secure from prying eyes. Use of a VPN computer also gives you the appearance of having an IP address of the VPN server, masking your identity.