Bullying that takes place over digital devices like computers, smartphones, or tablets, typically through social media or messaging platforms
cyberbullying
Fake websites or sellers can trick you into paying for goods that don’t exist or steal your payment information
fraud
The trail of data a person leaves behind while using the internet
Digital Footprint
Malicious software designed to damage or disrupt a computer system, or steal information
malware
Software that secretly collects information about a user’s activities without their consent
spyware
A fraudulent attempt to steal sensitive information, such as passwords or credit card numbers, by pretending to be a trustworthy entity
Phishing
A type of malware that locks users out of their device or encrypts their files, demanding payment to restore access
ransomware
Unsolicited and irrelevant emails or messages, often sent in bulk
spam
A type of malware that replicates itself and spreads from one device to another, often damaging systems
Virus
The act of creating a fake online identity to deceive others, often for fraudulent or harmful purposes
Catfishing
another tool used by spyware to take snapshots of your screen at specific intervals. This allows hackers to see exactly what you're doing, such as
Screen Scrapers
what are trusted sources to download data from
the Google Play Store or Apple App Store
The term "phishing" is a play on the word "_____" Just like a fisherman uses bait to catch fish, cybercriminals use fake emails, messages, or websites as bait to catch unsuspecting victims. The idea is that they are "______" for personal information
fishing
a type of spyware that records every key you press on your keyboard. This means everything you type—your passwords, emails, messages, and even online searches—can be tracked and saved by the spyware. Hackers can then access this information to
Keyloggers
what do you need to look out for when using apps
Infected Free Apps or Games