Definitions
from Wiktionary, Creative Commons Attribution/Share-Alike License.
- noun Plural form of
cyberthief .
Etymologies
Sorry, no etymologies found.
Support

Help support Wordnik (and make this page ad-free) by adopting the word cyberthieves.
Examples
-
Randy Abrams, director of technical education at antivirus firm Eset, predicts cyberthieves will alsoattack any tax-related services routed through smartphones.
-
With increasing frequency, cyberthieves are hijacking those futures, tapping the pristine Social Security numbers of children for adult purposes, enabling undocumented immigrants to gain employment and people with tainted credit to secure credit cards, mortgages and car loans, experts say.
Child Identity Theft Takes Advantage Of Kids' Unused Social Security Numbers 2011
-
In one recent, widely-circulating email, cyberthieves askrecipients to fill out a bogus "1042-W" form, make a print out, and then fax it to a number located in Alberta, Canada.
-
Among the side effects of the recession of 2009 are signs that cyberthieves are doing a booming business playing on our financial fears.
Cybersecurity: 2009 Consumer Reports State of the Net, new Ratings of security software 2009
-
The indictment charges that cyberthieves located in Egypt used classic phishing tactics to direct victims to phony Web sites, where they entered passwords, account numbers, and other data.
-
Its collapse followed multiple regulatory warnings about the thrift's technological vulnerabilities, an apparent attack by cyberthieves and a new capital hole that materialized minutes before Dwelling House was seized Friday at 4: 30 p.m.
-
The indictment charges that cyberthieves located in Egypt used classic phishing tactics to direct victims to phony Web sites, where they entered passwords, account numbers, and other data.
-
Among the side effects of the recession of 2009 are signs that cyberthieves are doing a booming business playing on our financial fears.
Cybersecurity: 2009 Consumer Reports State of the Net, new Ratings of security software 2009
-
Now the Capital One attack implied that Iceman wasn't just hosting a scurrilous Web site for cyberthieves.
One Hacker's Audacious Plan to Rule the Black Market in Stolen Credit Cards 2008
-
Now the Capital One attack implied that Iceman wasn't just hosting a scurrilous Web site for cyberthieves.
One Hacker's Audacious Plan to Rule the Black Market in Stolen Credit Cards 2008
Comments
Log in or sign up to get involved in the conversation. It's quick and easy.