password trap

password trap
A program or Web site that uses a legitimate-looking interface to fool users into providing their passwords.
Example Citation:
According to David, "Phishing scams are different than benign spam schemes that try to sell the user something or get them to open a link to an undesirable site. Phishing e-mails don't normally contain virus payloads, but SpyWare such as keystroke loggers and password traps may be downloaded when e-mail attachments from the phishing perpetrators are opened."
—Jon Gagne, "Scam Artists Look to Hook Sailors Through 'Phishing' E-Mails on NKO," Defense Department Documents and Publications, January 9, 2006
Earliest Citation:
Windows NT even forces users to press the Ctrl-Alt-Del key combination that reboots the system before logging on, just to make sure that the password dialog box that pops up is really Windows NT and not a nefarious password trap.
—Kevin Bachus, "Windows power play," Corporate Computing, January 1, 1993
Related Words: Categories:

New words. 2013.

Игры ⚽ Нужна курсовая?

Look at other dictionaries:

  • Wonder Boy III: The Dragon's Trap — North American boxart, Master System version Developer(s) Westone …   Wikipedia

  • phishing — ( pp. Creating a replica of an existing Web page to fool a user into submitting personal, financial, or password data. adj. phish v. phisher n. Example Citations: Phishing is the term coined by hackers who imitate legitimate companies in …   New words

  • passthought — n. A thought pattern that uniquely identifies a user, giving that person access to a computer system. Also: pass thought. [Blend of password and thought.] Example Citations: Ramaswamy Palaniappan, a computer scientist at the University of Essex,… …   New words

  • Internet — altmetrics ambient findability arachnerd bid shielding bitcom black hole resort blog blogosphere …   New words

  • man in the middle attack — n. A computer security breach in which a malicious user intercepts and possibly alters data traveling along a network. (Also: man in the middle attack.) Example Citation: If it delivers what s promised, Funk s Odyssey software will let… …   New words

  • shoulder surfing — pp. Stealing a computer password or access code by peeking over a person s shoulder while they type in the characters. shoulder surf v. shoulder surfer n. Example Citations: Telephone companies say they put a dent in this shoulder surfing by… …   New words

  • Hacking and Hackers — back hacking beehacker billion laughs biohacker bluejacking bot herder chief hacking officer cr …   New words

  • crimeware — n. Software that facilitates identity theft, phishing, or similar criminal activity. Example Citations: Norton Confidential, due to be released in October takes traditional anti virus and firewall software a step further, aiming to put itself… …   New words

  • dark-side hacker — n. A hacker who uses his or her talents for malicious or criminal ends. (Also known as a cracker.) Example Citation: Having a DSL or cable modem service means you have high speed access to the Internet, but there is a downside. Your computer… …   New words

  • distributed denial of service — adj. Relating to a computer attack that hijacks dozens or sometimes hundreds or computers around the Internet and instructs each of them to inundate a target site with meaningless requests for data. Also: DDoS. Example Citation: Yahoo,… …   New words

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”