Website spoofing is the creation of a replica of a trusted site with the intention of misleading visitors to a phishing site. Legitimate logos, fonts, colors and functionality are used to make the spoofed site look realistic.
Whale phishing is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Because of their status, if such a user becomes the victim of a phishing attack he can be considered a “big phish,”
Whitespace padding refers to a technique wherein cybercriminals insert spaces before a filename extension to disguise the real extension of the file. Malware or grayware authors do this so that, in a fixed-width column, the extension is no longer see
A computer worm is a self-contained program (or set of programs) that is able to spread functional copies of itself or its segments to other computer systems. The propagation usually takes place via network connections or email attachments.