ID Theft
Across
- 7. Card information using a hidden device.
- 8. Unauthorized use of another person's information (2 words).
- 10. Criminal pretending to be someone else.
- 12. Secret phrase used to access accounts.
- 14. Method requiring two verification steps (compound word).
- 16. Stored digitally.
- 17. Notification of suspicious account activity.
- 19. What you might lose if your pocket is picked.
- 20. PersonalIdentification Number (abbrev).
- 21. Phone-based phishing attack.
- 22. Placing a restriction on credit to prevent new accounts.
- 23. Protection from danger or risk.
- 24. General term for deception for financial gain.
- 25. Malware that locks files until payment is made.
Down
- 1. Scrambling data to protect it.
- 2. Software designed to harm computers.
- 3. Characteristics used to identify someone.
- 4. Identification number you should never give out.
- 5. Email designed to steal sensitive information.
- 6. Report you should check annually for suspicious activity (2 words).
- 9. Common target of phishing attempts.
- 11. To reveal confidential information (2 words).
- 13. Financial institution where accounts are held.
- 15. Payment demanded by ransomware attackers.
- 18. Type of card commonly targeted by thieves.
- 23. Dishonest scheme.
- 24. Security system that monitors traffic.