Across
- 3. Popular tool used to filter out spam emails.
- 9. To make information unclear, often to hide malicious code.
- 12. Country where many major spam and cybercrime networks originate.
- 13. A popular blog by the author covering cybersecurity.
- 14. Fraudulent emails pretending to be legitimate to steal data.
- 19. Process of moving a suspect from one country to face trial.
- 22. Describes servers resistant to being shut down, popular with criminals.
- 24. Malware that locks a computer until a ransom is paid.
- 25. A targeted form of phishing aimed at specific individuals.
- 27. First name of author
- 30. To take control of someone else’s computer or online account.
- 31. Leader of a significant Russian spam network.
- 32. An affiliate program used to promote prescription drugs online.
- 34. Attack that overloads a website to shut it down.
- 35. The primary motivation behind spamming and cybercrime.
- 37. A term describing a command signal used to connect to a botnet.
- 40. Name of Book
- 41. Faking information to deceive, often used in phishing.
- 43. Another spam affiliate network similar to Glavmed.
Down
- 1. An organized criminal scheme for profit, like illegal spamming.
- 2. Criminal who deals in stolen credit card information.
- 4. A cybersecurity expert mentioned in the book.
- 5. A hacker with malicious intentions.
- 6. Author and cybersecurity expert.
- 7. People who transfer stolen money on behalf of criminals.
- 8. A nickname for a notorious Russian spammer in the book.
- 10. A network of hacked computers controlled by cybercriminals for sending spam.
- 11. A member of a spam network who promotes illegal products.
- 15. Crime committed through computers and the internet.
- 16. Software that automatically displays or downloads ads on your computer.
- 17. The main leader of a criminal organization.
- 18. A major Russian spam organization mentioned in *Spam Nation*.
- 20. A Russian organization that facilitated illegal online drug sales.
- 21. Software tools that hide malware on a hacked computer.
- 23. Harmful software used by spammers to control computers.
- 26. Encoding data to keep it secure.
- 28. A large botnet used in major spam and malware campaigns.
- 29. Spam emails often advertise these for selling unregulated drugs online.
- 33. A type of malware that hides in legitimate-looking software.
- 36. Device or software that captures credit card info illegally.
- 38. A known figure involved in the illegal spam trade.
- 39. Organization that fights against spam globally.
- 42. Unwanted and unsolicited email, often advertising shady products.