adware - ** VERIFIED ANSWERS **✔✔Software that collects consumer surfing and purchasing
data
Botnet - ** VERIFIED ANSWERS **✔✔A network of hijacked computers
Bot herder - ** VERIFIED ANSWERS **✔✔Hackers that control hijacked computers.
Click fraud - ** VERIFIED ANSWERS **✔✔Inflating advertising revenue by clicking online ads
numerous times
DoS - ** VERIFIED ANSWERS **✔✔Overloading an Internet service provider's e‐mail server by
sending hundreds of e‐mail messages per second from randomly generated false addresses
E‐mail threats - ** VERIFIED ANSWERS **✔✔Sending an e‐mail instructing the recipient to do
something or they will suffer adverse consequences.
Hijacking - ** VERIFIED ANSWERS **✔✔Gaining control of a computer to carry out unauthorized
illicit activities.
Internet misinformation - ** VERIFIED ANSWERS **✔✔Circulating lies or misleading information
using the world's largest network.
Internet terrorism - ** VERIFIED ANSWERS **✔✔Using the Internet to disrupt communications
and e‐commerce
Key logger - ** VERIFIED ANSWERS **✔✔Use of spyware to record a user's keystrokes
, Pharming - ** VERIFIED ANSWERS **✔✔Diverting traffic from a legitimate Web site to a hacker's
Web site to gain access to personal and confidential information
Phishing - ** VERIFIED ANSWERS **✔✔E‐mails that look like they came from a legitimate source
but are actually from a hacker who is trying to get the user to divulge personal information.
Spamming - ** VERIFIED ANSWERS **✔✔E‐mailing an unsolicited message to many people at the
same time.
Splog - ** VERIFIED ANSWERS **✔✔A spam blog that promotes affiliated Web sites to increase
their Google PageRank
Spyware - ** VERIFIED ANSWERS **✔✔Software that monitors and reports a user's computing
habits.
Spoofing - ** VERIFIED ANSWERS **✔✔Making an e‐mail look like it came from someone else
Typosquatting - ** VERIFIED ANSWERS **✔✔Creating Web sites with names similar to real Web
sites so users making errors while entering a Web site name are sent to a hacker's site.
Bluebugging - ** VERIFIED ANSWERS **✔✔Making phone calls and sending text messages using
another user's phone without physically holding that phone
Bluesnarfing - ** VERIFIED ANSWERS **✔✔Capturing data from devices that use Bluetooth
technology
Eavesdropping - ** VERIFIED ANSWERS **✔✔Intercepting and/or listening in on private voice and
data transmissions
Evil twin - ** VERIFIED ANSWERS **✔✔A rogue wireless access point masquerading as a
legitimate access point