Real tech scam
Across
- 2. Fraudulent software that tricks users into unnecessary purchases by alarming or scaring them.
- 8. Manipulating individuals to divulge confidential information through psychological tactics.
- 11. Pretending to be someone else to deceive individuals or gain unauthorized access.
- 13. Software or hardware that records keystrokes on a computer without the user's knowledge.
- 14. A network of private computers infected with malicious software, controlled by a single entity.
Down
- 1. Redirecting website traffic to a fraudulent site to steal sensitive information.
- 3. Unwanted software designed to display advertisements on a user's device.
- 4. Deceptive attempt to obtain sensitive information by disguising as a trustworthy entity.
- 5. Software designed to harm or exploit systems, including viruses, worms, and spyware.
- 6. Malicious software that encrypts data, demanding payment for its release.
- 7. Voice phishing, a scam that uses phone calls to trick people into giving out personal information.
- 9. Deliberate exploitation of computer systems, networks, or technology-dependent enterprises.
- 10. Illegally collecting data from the magnetic stripe of a credit or debit card for fraudulent use.
- 12. Faking the source of an email or website to trick recipients into revealing information.