« Back to Glossary Index

A tactic that manipulates, influences, or takes advantage of a targeted user’s inability to detect an attack. The goal is to control the victim’s computer system or steal personal/financial information.

« Back to Glossary Index