Glossary of scam & cybersecurity terms
A jargon decoder for the digital safety era
When it comes to protecting your identity and avoiding scams, the terminology can get overwhelming — fast. From "smishing" to "pig butchering," today's cybersecurity threats come with a vocabulary all their own.
That's why we created this glossary: a simple, jargon-free reference guide for the most commonly used terms in fraud prevention, digital safety, and online security.
Browse cybersecurity glossary terms
A–D
- Catfishing – A scam in which someone creates a fake identity, often on dating apps or social media sites, to trick others into a relationship or financial scams.
- DDoS - Distributed Denial of Service – A type of cyberattack in which criminals flood a website or online service with massive amounts of traffic, making the site unstable or unavailable to real users.
- Deepfake – An image, video, or audio that has been edited or generated using artificial intelligence to misrepresent someone or spread false information.
- Doxxing – The act of publishing private or sensitive information that identifies an individual, usually with malicious intentions.
M–P
- Malware – Harmful software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
- Money mule – Someone who transfers or launders illegally obtained money on behalf of criminals so it’s harder to trace.
- Phishing – A common scam tactic in which criminals impersonate a trusted contact through text, email, or other messages to trick victims into revealing sensitive information.
- Pig butchering – A form of fraud in which scammers use emotional manipulation on dating apps, texts, or social media to manipulate people into investing in fake schemes.
- Ponzi scheme – A scam where money from new investors is used to pay earlier investors rather than real profits.
Q–T
- Ransomware – A specific type of malware designed to block access to a system or data until a ransom fee is paid.
- Smishing – A form of phishing carried out through texting, where scammers pose as a trusted contact to obtain sensitive information.
- Spoofing – A cyberattack where criminals disguise themselves as a trusted source—like an email, phone number, or website—to trick victims into sharing information.
How to use this glossary
Whenever you see a word on our site that's underlined or marked with an info icon, simply hover over it to see a plain-language definition. You'll get a quick explanation plus current trends and related terms — no technical jargon, just what you need to stay informed.
Our promise
We believe everyone deserves to understand the risks they face online — without having to wade through confusing terminology. This glossary is part of our commitment to making digital protection clear, accessible, and actionable for all.