Compare commits

..

No commits in common. "023c8aa08681d6bc4d132dc55d2d406eaa75134a" and "59a44d3696364623880cc7aad11492b493b48104" have entirely different histories.

43 changed files with 28 additions and 62 deletions

View file

@ -1,3 +1 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Kontoübernahme
Account Takeover
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.

View file

@ -1,4 +1,4 @@
Koordiniertes unauthentisches Verhalten
Coordinated Inauthentic Behavior
Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout.

View file

@ -1,4 +1,4 @@
Urheberrechtsverletzung
Copyright Infringement
The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholders permission and without an applicable copyright exception or limitation.

View file

@ -1,4 +1,4 @@
Doxxen
Doxxing
The act of disclosing someones personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the persons consent.

View file

@ -1,4 +1,4 @@
Hassrede
Hate Speech
Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics.

View file

@ -1,4 +1,4 @@
Fehlinformationen
Misinformation
False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons.

View file

@ -1,3 +1 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Toma de control de cuenta
Account Takeover
El escenario en el que un usuario no autorizado adquiera el control de una cuenta de usuario, a través de medios tales como hacking, phishing o compra de credenciales filtradas.
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.

View file

@ -1,3 +1,3 @@
Campaña de simulación
Astroturfing
Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources.

View file

@ -1,4 +1,4 @@
Intervención coordinada
Brigading
Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board.

View file

@ -1,3 +1 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1 @@
Phishing
La pratique frauduleuse consistant à envoyer des courriels ou d'autres messages censés provenir de sources fiables, afin d'inciter les destinataires à révéler des informations personnelles tels que mots de passe ou numéros de carte de crédit.

View file

@ -1,3 +1 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
アカウントの乗っ取り
Account Takeover
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.

View file

@ -1,3 +1 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
スパム
Spam
Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media.

View file

@ -1,3 +1 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Account overname
Account Takeover
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.

View file

@ -1,4 +1,4 @@
Georganiseerde aanval
Brigading
Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board.

View file

@ -1,3 +1,3 @@
Risico's gerelateerd aan inhoud en gedrag
Content- and Conduct-Related Risk
The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service.

View file

@ -1,4 +1,4 @@
Auteursrechtenschending
Copyright Infringement
The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholders permission and without an applicable copyright exception or limitation.

View file

@ -1,4 +1,4 @@
Vervalsing
Counterfeit
The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic.

View file

@ -1,4 +1,4 @@
Disinformatie
Disinformation
False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions.

View file

@ -1,4 +1,4 @@
Glorificatie van geweld
Glorification of Violence
Statements or images that celebrate past or hypothetical future acts of violence.

View file

@ -1,4 +1,4 @@
Misinformatie
Misinformation
False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons.

View file

@ -1,3 +1 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,4 +1,4 @@
Synthetische Media
Synthetic Media
Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media.

View file

@ -1,3 +1 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1,3 @@
Hesap Devralma
Account Takeover
Yetkisiz bir kullanıcının bilgisayar korsanlığı, kimlik avı veya sızdırılmış kimlik bilgilerini satın alma gibi yöntemlerle bir kullanıcı hesabının kontrolünü ele geçirdiği senaryo.
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.

View file

@ -1,4 +1,4 @@
Telif Hakkı İhlali
Copyright Infringement
The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholders permission and without an applicable copyright exception or limitation.

View file

@ -1,4 +1,4 @@
Sahte
Counterfeit
The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic.

View file

@ -1,4 +1,4 @@
Şiddeti yüceltme
Glorification of Violence
Statements or images that celebrate past or hypothetical future acts of violence.

View file

@ -1,4 +1,4 @@
Nefret Söylemi
Hate Speech
Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics.

View file

@ -1,4 +1,4 @@
Kişisellleştirme
Impersonation
Online impersonation most often involves the creation of an account profile that uses someone elses name, image, likeness or other characteristics without that persons permission to create a false or misleading impression that the account is controlled by them.

View file

@ -1,3 +1 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1 @@
Phishing
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -1,3 +1 @@
Phishing
伪造邮件或其他消息,谎称来自可靠来源,以诱骗个人泄露密码、信用卡号等个人信息的欺诈行为。