Identity theft
Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information, such as Social Security or driver's license numbers, in order to impersonate someone else.
Keystroke logger
A keylogger or keystroke logger is a type of software that tracks or logs the keys struck on your keyboard, typically in a covert manner so that you don't know that your actions are being monitored.
Mail fraud
In the United States, mail and wire fraud include any scheme to intentionally defraud a person using United States Postal Service by through the mail or by telephone call or electronic communication.
Password manager
A password manager application supports centralized secure storage of passwords and helps manage using unique passwords across each site.
Phishing
The fraudulent practice of sending emails purporting to be from reputable companies in order to get individuals to reveal personal information, such as passwords and credit card numbers.
Ransomware
A type of malicious software designed to block access to a computer system until a sum of money is paid.
Shoulder surfing
Spying on the user of an ATM, computer, or other electronic device in order to obtain their personal access information.
Social engineering
The use of deception to manipulate someone into giving away confidential or personal information that may be used for fraud.
Spyware
Spyware is software that enables a user to obtain covert information about another's computer activities by transmitting data.
Vishing
Making phone calls or leaving voice messages supposedly from reputable companies in order to get people to reveal their personal information, such as bank details and credit card numbers.
VPN (virtual private network)
A VPN creates a virtual encrypted tunnel between you and a remote server operated by a VPN service. All external internet traffic is routed through this tunnel, so your data is secure from prying eyes. Use of a VPN computer also gives you the appearance of having an IP address of the VPN server, masking your identity.
Disclaimer
The content on this page is provided for informational purposes and is not intended to provide authoritative information security, data protection, or other professional or legal advice. Links to third party web sites and content do not constitute an endorsement or sponsorship by Computershare and Computershare does not represent or warrant that the contents of those web sites are accurate, compliant with any applicable law, or compliant with copyright or other intellectual property laws. Any reliance on the contents of a third party web site is at your own risk and you assume all responsibilities and consequences resulting from such reliance.