Real tech scam

1234567891011121314
Across
  1. 2. Fraudulent software that tricks users into unnecessary purchases by alarming or scaring them.
  2. 8. Manipulating individuals to divulge confidential information through psychological tactics.
  3. 11. Pretending to be someone else to deceive individuals or gain unauthorized access.
  4. 13. Software or hardware that records keystrokes on a computer without the user's knowledge.
  5. 14. A network of private computers infected with malicious software, controlled by a single entity.
Down
  1. 1. Redirecting website traffic to a fraudulent site to steal sensitive information.
  2. 3. Unwanted software designed to display advertisements on a user's device.
  3. 4. Deceptive attempt to obtain sensitive information by disguising as a trustworthy entity.
  4. 5. Software designed to harm or exploit systems, including viruses, worms, and spyware.
  5. 6. Malicious software that encrypts data, demanding payment for its release.
  6. 7. Voice phishing, a scam that uses phone calls to trick people into giving out personal information.
  7. 9. Deliberate exploitation of computer systems, networks, or technology-dependent enterprises.
  8. 10. Illegally collecting data from the magnetic stripe of a credit or debit card for fraudulent use.
  9. 12. Faking the source of an email or website to trick recipients into revealing information.