There are currently 14 names in this directory beginning with the letter T.
Illegally accessing a service/system using another persons's authorized credintials. [ Type: Terminology ]
Tailored Trustworth Space
A cyberspace environment that provides a user with confidence in its security, using automated mechanisms to ascertain security conditions and adjust the level of security based on the user’s context and in the face of an evolving range of threats. [ Type: Terminology ]
Shutting down of specific fraudulent profiles (not the full website) that affect a brand or individual including cybersquatting. [ Type: Response ]
Text sharing sites
Websites that provide online storage of text, similar to an online Notepad. Often, a source for copywrite infringement. [ Type: Analysis ]
Tilde Phish use a unique style of multiple URLs that point to websites on several domains, when in reality they send the user to the same phishing website. This method uses the fact that some web servers are configured to all al-low file path viewing on any virtual domain hosted on that server. The URLs contain a tilde (~), hence the name. [ Type: Attack]
Binary Trading (commonly also known as Binary Options Trading or Binary Options) is a type of option where the trader takes a yes or no position on the price of a stock or other assets, with the resulting payoff being all or nothing. Questionable activities such as brand infringement, unregistered establishments, identity theft, misrepresentation of potential gains and back-end manipulation of software to cheat users is common in the name of BOT. As there does not appear to be an explicit legal framework to govern binary trading, online companies continue to operate and trap victims. This type of scam is known as TRAP10. [ Type: Terminology ]
The act of trash talking or annoying someone using the internet for fun. Trolling usually involves using sarcasm to get on the nerves of that person.
Tactics (or Tools), Techniques, and Procedures is the behavior of attackers or adversaries in the cyber space. TTPs are usually deeply analyzed to understand how the adversary works and how to expect and prepare for future attacks.
Twishing refers to phishing scams that are carried over Twitter. The attacker might tweet a post interesting or strange enough to trick users into visiting a fraudulent website and logging in with their credentials.