pharming
a technique used to redirect a legitimate websites traffic to another illegitimate website in order to gain access to a user's personal information
virus
a self-replicating program that is designed to infect a computer by rapidly spreading from one file to another, sometimes causing great harm
phishing
mail or instant message scams that are disguised to look like official communications from a legitimate website
trojan horse
a type of malware that appears to be benign or desirable and thus tricks the user into allowing the program access to their computer, usually through a download or email attachment
malware
intentionally malicious software or code that is designed to damage your computer or collect information without your knowledge
spyware
a type of malware that collects information about users without their knowledge, often to track browsing habits and to create pop-up advertisements
spam
unsolicited email or junk mail
browse hijacking
occurs when malware or spyware replaces your browser's home page with its own in order to force more hits to a particular website
clickjacking
a technique that tricks users into clicking on a malicious link by adding the link to a transparent layer over what appears to be a legitimate web page
hoax
an email chain letter that warns of impending viruses and ties to scare users into forwarding and continuing the hoax email
mousetrapping
keeps visitors from leaving a website by locking them into a window, opening multiple windows on the desktop, or relaunching their website in a window that can't be closed
sockpuppet
a fake identity that someone creates and uses to deceive others for some kind of personal gain
avatar
a virtual representation of yourself
dooced
someone losing their job because of something they posted on a blog or social networking site
troll
a person who posts comments just to get a rise out of people and cause a distraction
flame war
a heated argument in a social media outlet such as a web forum, mailing list or chat room, in which intentionally insulting comments and personal attacks become a focus of conversation
screen name
(username) a virtual name that is used to identify users of a website where social media is a component (real name or pseudonym)
flame bait
a comment posted by someone trying to provoke a flame: an angry response
meme
something that has gone viral, or spread rapidly around the internet, such as a catchphrase, hoax, topic, concept or piece of media
posts
content that people publish on websites involving social media, such as blogs, newsgroups, and forums
chats
live, online conversations
computer privacy
keeping your personal files and data secret and secure from unauthorized viewing or tampering
computer security
the measures you can take to avoid threats and damage to your computer from physical harm or tampering
hacker
a person who intentionally gains access to your computer when you connect it to the Internet with the intent of doing harm to the system or using the system in an unauthorized manner
software piracy
theft of a computer design or program by downloading or copying without permission
antivirus software
specifically protects against viruses
anti-spyware software
protects against malicious software that may be gathering your information without your knowledge
firewall
screens out threats that try to reach your computer over the Internet