SECURITY CENTER
COLUMNIST / BLOGS
TOOLS
PODCASTS/VIDEOS
Safeguard Financial
Safeguard Financials Glossaries
Card Scanner: A device used to scan and save information from credit cards, driver's licenses, passports, medical cards and other cards.
Crimeware: A term used to describe malware and other programs used to automate the process of identity theft and cyber crime. Crimeware is designed to access online account information and illegally access funds, etc.
Data Breach: Unintentional disclosure of information that compromises the security of personal information and can lead of identity theft. "Data breach" is typically used to describe inadvertent disclosure of information on the part of a company or organization.
Drive-by Download: Software automatically installed on a computer during a visit to a website, without user knowledge.
Dumpster Diving: Looking through trash for personal information, etc.
Fraud: An act or practice resulting in the loss of rights or property. Fraud typically involves making false and misleading representations in order to cheat or steal.
Hacker: An individual who creates or takes advantage of security weaknesses.
Identity Fraud: Using personal information that is "made up" as opposed to stolen from an individual.
Identity Theft: Stealing another person's information to commit a crime or fraud.
Keystroke Logging: Software tools that capture a user's keystrokes, thus gaining access to logins, passwords, and other information.
Mail Fraud: Stealing mail to obtain personal information, medical information, to apply for pre-approved credit cards, etc.
Malicious Adware: Advertising driven software that displays or downloads misleading advertisements to a computer. May be spyware.
Malware: Harmful software like viruses, Trojan horses, worms, and spyware.
Pharming: Redirecting Internet traffic from one website to another in order to trick users into entering personal information.
Phishing: Tricking a person into giving personal information, often through links sent within emails. Typically identity thieves phish by posing as a financial institution.
Pretexting: Collecting personal information by using false pretenses, typically over the phone or by email.
Security Alert: Statement added to a credit report after a credit bureau has been notified the consumer was a victim of fraud or identity theft. Helps protect the consumer from further occurrences.
SEO Poisoning: Manipulating search engine results to place malware site at the top of search engine results.
Spam: Unsolicited emails, often from non-legitimate businesses or entities.
Spyware: Any application that gathers information without an individual's knowledge.
Trojan Horse: An application that installs malicious programs that can run unnoticed by the user.
Virus: An application that can install itself and infect a computer without the user's knowledge.
Worm: Computer virus that can self-replicate by resending itself via email or other network application.