Glossary of scam & cybersecurity terms

A jargon decoder for the digital safety era

When it comes to protecting your identity and avoiding scams, the terminology can get overwhelming — fast. From "smishing" to "pig butchering," today's cybersecurity threats come with a vocabulary all their own.

That's why we created this glossary: a simple, jargon-free reference guide for the most commonly used terms in fraud prevention, digital safety, and online security.

Browse cybersecurity glossary terms

A–D

  • Catfishing – A scam in which someone creates a fake identity, often on dating apps or social media sites, to trick others into a relationship or financial scams.
  • DDoS - Distributed Denial of Service – A type of cyberattack in which criminals flood a website or online service with massive amounts of traffic, making the site unstable or unavailable to real users.
  • Deepfake – An image, video, or audio that has been edited or generated using artificial intelligence to misrepresent someone or spread false information.
  • Doxxing – The act of publishing private or sensitive information that identifies an individual, usually with malicious intentions.

M–P

  • Malware – Harmful software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
  • Money mule – Someone who transfers or launders illegally obtained money on behalf of criminals so it’s harder to trace.
  • Phishing – A common scam tactic in which criminals impersonate a trusted contact through text, email, or other messages to trick victims into revealing sensitive information.
  • Pig butchering – A form of fraud in which scammers use emotional manipulation on dating apps, texts, or social media to manipulate people into investing in fake schemes.
  • Ponzi scheme – A scam where money from new investors is used to pay earlier investors rather than real profits.

Q–T

  • Ransomware – A specific type of malware designed to block access to a system or data until a ransom fee is paid.
  • Smishing – A form of phishing carried out through texting, where scammers pose as a trusted contact to obtain sensitive information.
  • Spoofing – A cyberattack where criminals disguise themselves as a trusted source—like an email, phone number, or website—to trick victims into sharing information.

How to use this glossary

Whenever you see a word on our site that's underlined or marked with an info icon, simply hover over it to see a plain-language definition. You'll get a quick explanation plus current trends and related terms — no technical jargon, just what you need to stay informed.

Our promise

We believe everyone deserves to understand the risks they face online — without having to wade through confusing terminology. This glossary is part of our commitment to making digital protection clear, accessible, and actionable for all.