Privacy and Security
kleptography
man in the middle attack
neurosecurity
paperless trail
participatory panopticon
passface
passthought
phishing
phone phishing
pod slurping
pretexting
privacy management
puddle phishing
ransomware
scam baiting
screenshotting
shoulder surfing
smishing
Snowden effect
sousveillance
spear-phishing
spyware
stealth wear
stego
targeted Trojan horse
ungoogleable
vishing
war chalking
war driving
war texting
Web bug
whitelist
zero-day