Glossary
Zahteve zaključka
Patient Portal Phishing |
Scammers send messages that look like your clinic or hospital. They push you to click a link and “log in” to view test results or fix your account. The link opens a fake portal that steals your username, password, or verification codes. |
Fake Telehealth Clinics |
These are look-alike websites or apps pretending to offer online doctor visits. They may promise instant appointments or “special offers,” then collect your personal details and payments. Always use official clinic channels and check the web address carefully. |
Counterfeit Medicines |
Scammers sell fake or unsafe medicines online, often at very low prices or “no prescription needed.” The products may be ineffective or dangerous, and your payment details can be stolen. Buy medicines only from regulated pharmacies and trusted sources. |
Love-bombing |
Scammers show intense affection very quickly—constant messages, big compliments, and “soulmate” talk. The goal is to create emotional attachment fast, so you trust them before you can verify who they are. |
Catfishing |
A scammer pretends to be someone else online, often using stolen photos or a fake identity. The profile may look “perfect,” but details are vague or inconsistent, and they avoid real-time proof like video calls. |
Isolation |
The scammer asks you to keep the relationship secret and discourages you from talking to family or friends. This isolates you from support and makes it easier for them to pressure you into sending money. |
Personal data |
this is information that can identify you, such as your name, phone number, email address, home address, or social security number. It should be shared with caution and only with trusted entities. |
Privacy settings |
these are options in apps, websites, and social media that let you decide who can see your data, photos, and activity. |
Public profile |
means that the information and photos are visible to everyone on the Internet, including strangers. This may increase the risk of fraud and abuse. |
Strong password |
A password that is long, unique, and difficult to guess. It does not contain personal information and is not used on multiple websites. |
Two-step verification (2FA) |
Additional account security that requires a second login step, such as an SMS code or confirmation in the app. |
Malicious software |
A program that can install itself without your knowledge and be used to spy on your data, lock your device, or steal information. |
Smishing |
A type of fraud in which criminals send fake SMS or text messages while pretending to be banks, courier companies, or official institutions in order to obtain data or money. |
Fake login page |
A website that looks like the real website of a bank or company, but is used to steal login details, passwords, or card information. |
Time pressure |
A manipulation technique that involves creating a sense of urgency or fear to make it harder for you to verify information calmly (for example, “your last chance” or “your account will be blocked”). |
Impersonation Fraud |
A type of cybercrime in which attackers falsely present themselves as legitimate institutions (such as banks, government agencies, or service providers) in order to gain trust and obtain sensitive information or money. |
Institutional Trust Abuse |
The misuse of public trust in well-known organizations by criminals who exploit familiarity and authority to manipulate individuals into complying with fraudulent requests. |
Verification Mechanism |
Technical or procedural methods used to confirm the authenticity of communications, services, or requests, such as official contact channels, security checks, or identity confirmation processes. |
Vishing Call |
Aa phone call from someone pretending to be a bank or crypto expert, trying to trick you into giving personal information or sending money. |
Cryptocurrency |
A cryptocurrency is a type of digital money that exists only online. It is not issued by a bank or government and is often used for online payments or investments. |
Unsafe Investments |
Sending money to unknown accounts, investing in unknown ryptocurrencies, or following unverified advice can lead to losing all your funds. |
Deepfake |
A technology that can be used to create realistic fake voices or videos with which scammers impersonate real people, for example pretending to be your grandchild or another family member. |
Social Engineering |
is the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information. |
Spoofing |
A cybersecurity technique in which a scammer disguises their identity by faking an email address, phone number, website, or sender information to appear as a trusted source. |
Fake Ads |
can appear on social media, websites, or even on search engines like Google. They can look very real and usually offer amazing discounts to attract clicks. Clicking can lead to fake website. |
Fake Websites |
can look either very professional or very low-quality. Scammers use them to sell products that don’t exist, never arrive or are counterfeit items. |
Unsafe Payments Methods |
like wire transfers, prepaid cards, or cryptocurrency can let scammers take your money without any way to get it back. |
Phishing |
Scammers send fake emails or messages that look real. They try to make you click a link or share personal details, like your password or bank number. |
URL (Uniform Resource Locator) |
is the unique web address that identifies the specific location of a resource like a webpage, image, or file) on the internet, telling your browser how to find and retrieve it. |
Data Privacy |
This means keeping your personal information safe like your name, address, or ID number. Share these details only on trusted websites or with people you know. |
Zadnja sprememba: sreda, 18. marec 2026, 11.29