top of page
Digital Construction_edited_edited_edited.jpg
Wooden Alphabet Letters

Scamming Terminology

Learning the Lingo to stay ahead of the sammers

Like many clubs or societies, fraudsters have a language all their own. While some slang terms are obvious, others are very oblique and keep innocent people in the dark. Here is a FRAUD GLOSSARY of terms...but I might be missing a few as the glossary is growing by the day! ​

Digital Construction_edited_edited_edited.jpg

My Story

SMISHING

Using text messages to deceive individuals into revealing personal information.

REAL TIME BIDDING

How Google makes money using user data is through its advertising services, specifically by enabling the automated auction of ad space via real-time bidding (RTB). In this process, Google shares user data with advertisers to display personalized ads, generating revenue for itself and its partners by matching users with relevant advertisements. 

QUISHING

A cybersecurity scam where attackers use fake QR codes to trick people into visiting malicious websites, downloading malware, or revealing sensitive personal and financial information.

VISHING

Short for "voice phishing," is a type of cyberattack where scammers use phone calls or voice messages to trick individuals into revealing sensitive information. 

SPEAR PHISHING

When criminals obtain information about you from websites or social networking sites, they and customize a phishing scheme that is individualized to you. Targets are more likely to interact with this type of scam because the scammer used AI to learn your specific online behaviors. 

KEYLOGGING

Keylogging refers to software or hardware designed to secretly record every keystroke you make on your computer or mobile device. 

IMPOSTER

Scammers try to convince you to send money by pretending to be someone you know or trust.

RANSOMWARE

 Type of malicious software (malware) that locks or encrypts your files, making them inaccessible until you pay a ransom.

CLICKBAIT

A story or link designed to attract a reader’s attention. By clicking the link, you may share information unwittingly or inadvertently download malware or spyware.

CLONING

Creating near-identical duplicates of legitimate websites, emails, social media profiles, or even voices to trick individuals into believing they're interacting with a trusted source. 

DARK WEB

A network of servers and websites that are hidden making it harder for authorities to infiltrate. The dark web has become the Internet's black market, where visitors can buy anything from guns to drugs and fake ID's.

DEEP FAKE

Images, videos, or audio that have been edited or generated using artificial intelligence, AI-based tools or audio-video editing software, In an effort to replace the person in the original with someone else to steal their identity or impersonate them for financial gain.

ANGLER FISHING

Fake customer service accounts on social media trick users into revealing personal data.

SURVEILLANCE
CAPITALISM

​Companies that offer their products and services for free, like google, and make their money by selling your data. Their  “product” they are selling for profit, IS YOUR DATA. 

SIGNAL INTERCEPTION

​Intercepting the unique identifying number that a cellphone transmits through radio waves and copying the number to another phone. A thief then will use the second phone, charging the legitimate owner of the first phone for data use and calls on the cloned phone.

SIM HIJACKING

 A type of identity theft in which attackers deceive or bribe mobile carriers into transferring a victim's phone number to a SIM card they control. This gives the attacker the ability to intercept calls, text messages, one-time passcodes, and other multi factor authentication (MFA) methods. This allows the attackers to gain unauthorized access to the victim's accounts. 

MALVERTISING

 Online advertising that contains malware activated when you click on the ad.

SCAREWARE

​Malicious software used in tech support scams that displays on-screen warnings of nonexistent infections on your computer to persuade you to call a number for assistance, only to be connected to a criminal who seeks to steal money or sensitive information.

GRAYWARE

Software that isn't classified as a virus or major malware but has undesirable, annoying, or undisclosed behavior such as pop-up ads.

FAKE LISTINGS SCAM

Scammers creating fraudulent advertisements for properties that aren't for sale or rent to steal money from potential renters or buyers. 

SURVEILLANCE CAPITALISM

The term for the business model where a company profits from user data rather than selling a product. Google and Facebook are prime examples,

PHISHING

Cybercrime where scammers, posing as legitimate organizations or people, use fake emails, texts, or phone calls to trick victims into revealing sensitive information like passwords, bank details, or personal data

PHARMING

Pharming, a portmanteau of the words "phishing" and "farming", is an online scam similar to phishing, where a website's traffic is manipulated, and confidential information is stolen. In essence, it is the criminal act of producing a fake website and then redirecting users to it to steal personal or financial information. 

SPOOFING

When someone disguises an email, phone number, or website to trick you into interacting with a fake source. 

SPAMMING

Unsolicited email, instant messages, or social media messages. These messages are fairly easy to spot and can be damaging if you open or respond.

SOCIAL ENGINEERING

​Manipulative tactics used by scammers to deceive individuals into divulging personal information or performing actions that benefit the scammer. It can include everything from impersonating a trusted figure to creating a sense of urgency that pressures the victim to act quickly.

MALWARE

'Malicious software'. It's designed to gain access to your computer or other devices to introduce a virus into your system 

CATFISHING

Creating a fake online profile to intentionally deceive, usually through a romance scam.

CRAMMING

​The illegal placement of unauthorized charges on your phone bill for unrequested services or calls not made.

DATA BROKER

An individual or company that collects and sells personal data or data about people to third parties for various uses.

SPYWARE

Spyware is malicious software that collects information about a user's computer activity without their knowledge. Scammers can use spyware to spy on a user's keystrokes and use the data they capture to commit identity theft.

BRUTE FORCE ATTACK

A hacking method to find passwords or encryption keys by trying every possible combination of characters until the correct one is found. 

DOMAIN SPOOFING

Creating a fake website URL that mimics a trusted organization.

MONEY MULE

A person (often unknowingly) recruited to transfer illicit funds for scammers.

ShinyHunters

A notorious cybercriminal group that emerged in 2020. They are tied to a string of high profile data breaches targeting AT&T Wireless, Microsoft, and Ticketmaster...to name a few.

GHOSTING

​Theft of the identity of a dead person to fraudulently open credit accounts, obtain loans or get utility or medical services in the person’s name. It is only one type of identity theft.

MAN IN THE MIDDLE ATTACK

​When a criminal secretly intercepts and possibly alters messages between two parties who believe they are securely communicating with each other.

SYNTHETIC IDENTITY

Information from stolen ID cards combined with fake information to build a new identity, making this fraud difficult to detect.

WORMS

Self-replicating malware that spreads to other computers on the same network. 

FAKE INSPECTORS

A fake home inspector is a scammer posing as a legitimate professional to gain access to your home, often resulting in unnecessary repairs or fraudulent charges. 

Grunge Wall

Call 

435 - 772 -1986

Email 

Need Help Now

bottom of page