Email spoofing – creation of email messages with forged sender address.
Spam – unsolicited, undesired, or illegal email messages.
Phishing – is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity.
Whaling – also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive information from a company. In many whaling attacks, the attacker’s goal is to manipulate the victim into authorizing high-value wire transfers to the attacker.
Viruses, Malware, Ransomware – is any software intentionally designed to cause damage to a computer, server, client or computer network.
Denial of Service (DoS attack) – is a cyber-attack in which the perpetrator seeks to disable, shut down or disrupt a network, website or service.
Business Email Compromise (BEC) – Acronym describing many common forms of targeted attacks carried out via email AKA phishing attacks. Very targeted, attackers research the target organisation to understand who the senior people are and who is likely to respond “well” to a BEC attack.