10.08.2013 Views

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

20) Pharming: is a scamming practice in which malicious code is installed on a<br />

personal computer or server, misdirecting users to fraudulent websites without their<br />

knowledge or consent. Pharming has been called ‘phishing without a lure’.<br />

21) Ripper: vendors on underground servers who conduct fraudulent transactions<br />

such as not delivering purchased goods, or deliberately sell invalid or fake credit cards.<br />

22) Script Kiddie: unskilled hacker, usually not an expert in computer security, who<br />

breaks into computer systems by using pre-packaged automated tools written by others.<br />

23) Skimming: is the theft <strong>of</strong> credit card information used in an otherwise legitimate<br />

transaction. Instances <strong>of</strong> skimming include stealing the information <strong>of</strong> the magnetic<br />

stripe and the pin number from an ATM (automated teller machine), or using a fake<br />

point <strong>of</strong> sale terminal in a commercial establishment (shop, restaurant, petrol<br />

station, etc).<br />

24) Spamming: is the practice <strong>of</strong> sending unwanted e-mail messages, frequently<br />

with commercial content, in large quantities to an indiscriminate set <strong>of</strong> recipients.<br />

Increasingly, e-mail spam today is sent via ‘zombies’, that is, networks <strong>of</strong> virus- or<br />

worm-infected personal computers. Many modern worms install a backdoor allowing the<br />

spammer access to the computer and use it for malicious purposes.<br />

25) Spear phishing: is an e-mail spo<strong>of</strong>ing fraud attempt that targets a specific<br />

organisation, seeking unauthorised access to confidential data. As with the e-mail<br />

messages used in regular phishing expeditions, spear phishing messages appear to<br />

come from a trusted source. In spear-phishing the apparent source <strong>of</strong> the e-mail is likely<br />

to be an individual within the recipient's own company and generally someone in a<br />

position <strong>of</strong> authority.<br />

Page 95

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!