| English | Spanish |
|---|---|
| Access | Acceso |
| Accounts | Cuentas |
| Almost | Casi |
| Alter | Modificar |
| Antivirus | Antivirus |
| Attached | Adjuntos |
| Attack | Ataque |
| Botnet | Botnet |
| Common | Común |
| Computer | Computadora |
| Computers | Computadoras |
| Confirm | Confirmar |
| Connection | Conexión |
| Control | Control |
| Controlled | Controlado |
| Controlling | Controlando |
| Convince | Convencer |
| Correctly | Correctamente |
| Criminals | Criminales |
| Criminals | Criminales |
| Cyber | Ciber |
| Delete | Borrar |
| Denial | Denegación |
| Drive | Unidad |
| Emails | Correos electrónicos |
| Enter | Entrar |
| Entered | Ingresado |
| Exploit | Explotar |
| Fake | Falso |
| Files | Archivos |
| Financial | Financiero |
| Find | Encontrar |
| Hackers | Hackers |
| Hacking | Hacking |
| Hard | Duro |
| Hardware | Hardware |
| Identical | Idéntico |
| Infected | Infectados |
| Information | Información |
| Install | Instalar |
| Install | Instalar |
| Internet | Internet |
| Intimidating | Intimidante |
| Legitimate | Legítimo |
| Likes | Me gusta |
| Looking | Mirando |
| Lose | Perder |
| Loss | Pérdida |
| Malware | Malware |
| Manner | Manera |
| Media | Medios |
| Message | Mensaje |
| Messages | Mensajes |
| Official | Oficial |
| Online | En línea |
| Originator | Originador |
| Passwords | Contraseñas |
| Personal | Personal |
| Pharming | Pharming |
| Phishing | Phishing |
| Pop-up | Ventana emergente |
| Pose | Plantear |
| Providing | Proporcionar |
| Redirecting | Redirigiendo |
| Reformat | Reformatear |
| Remotely | Remotamente |
| Risk | Riesgo |
| Robots | Robots |
| Scareware | Scareware |
| Search | Búsqueda |
| Security | Seguridad |
| Sensitive | Sensible |
| Service | de servicio |
| Settings | Configuraciones |
| Social | Social |
| Software | Software |
| Spam | Spam |
| Specifications | Especificaciones |
| Spoofing | Suplantación |
| Steal | Robar |
| Steal | Robar |
| Take | Tomar |
| Techniques | Técnicas |
| Text | Texto |
| Tools | Herramientas |
| Trick | Engañar |
| Trojan horse | Caballo de Troya |
| Type | Tipo |
| URL | URL |
| Unauthorized | No autorizado |
| Update | Actualizar |
| Usernames | Nombres de usuario |
| Users | Usuarios |
| Validate | Validar |
| Viruses | Virus |
| Weaknesses | Debilidades |
| Websites | Sitios web |
| Zombies | Zombies |
Please note that some terms, especially technical ones, may not have a direct translation, and in those cases, the English term is commonly used in Spanish as well.