Malicious software created to damage or gain illegal access to a computer system. (e.g. Trojan Horse, virus, spyware etc.)
When someone sends an e-mail or text pretending to be a well-known business, asking the recipient to share their personal information (e.g account number, password).
Typing SQL code in an input box of a form to try to access or attack an SQL database.
Data Interception and Theft
The act of intercepting or stealing information from a computer system or from an electronic communication.
A way of gaining sensitive information or illegal access to a computer system or network by influencing people (usually employees of an organisation).