Bug Buster
Phishing Patrol
Threat Tracker
Secure Data
Hacker History
100

Broader term that encompasses all types of malicious software.

What is Malware?

100

Common signs of a phishing email include.

What are Misspellings, generic greetings, urgent language, suspicious links, and unexpected attachments?

100

Type of cybercrime that impersonates legitimate institutions to trick individuals into revealing sensitive information; often done through deceptive emails, text messages, or websites that appear trustworthy.

What is Phishing?

100

A set of changes applied to a software to improve its functionality, fix bugs, enhance security, or add new features - crucial for maintaining performance and security of one's software and devices.

What is Software Update?

100

In 2004, President George W. Bush declared __________ to be Cybersecurity Awareness Month.

What is October?

200

Malicious software designed to replicate itself and spread to other files or programs on a computer.

What is Virus?

200

Security tool that analyzes incoming emails, messages, and websites for signs of phishing activity - designed to protect users from malicious attacks by neutralizing suspicious emails.

What is Phishing Filter?

200

Manipulation technique that uses psychological tactics to manipulate users into providing confidential sensitive information.

What is Social Engineering?

200

Security measures that require users to provide two or more verification factors to gain access to an account.

What is Multi-factor Authentication (MFA)?

200

There are over _____ attacks each day which breaks down to nearly 1 cyberattack every 39 seconds.

What is 2,200?

300

Malicious software that encrypts files or locks users out of their system, demanding payment to restore access.

What is Ransomware?

300

Technique where attackers create a fake website that looks like a legitimate one to steal information.

What is Website Spoofing?

300

Type of cybercrime where attackers disguise communication to appear from a known and trusted source.

What is Spoofing?

300

Creating copies of important documents or files and storing them in a separate location to protect against data loss.

What are Regular Backups?

300

Yahoo's historic data breach in 2013 compromised __________ people in total.

What is 3 billion?

400

Malicious software that secretly monitors and collects information without a user's consent.

What is Spyware?

400
Term for a phishing attack that targets high-profile individuals like executives.

What is Whaling?

400

AI-generated forgeries that appear very real and have the potential to reshape public opinion and damage reputation.

What is Deepfake?

400

Service that creates a secure, encrypted connection between the user's device and the internet.

What is a Virtual Private Network (VPN)?

400

One of the most destructive viruses ever, _____ spread via email with the subject "I love you." It infected millions of computers worldwide, causing billions of dollars in damages.

What is ILOVEYOU?

500

Malicious software designed to display advertisements on a user's device in forms of pop-ups or banners that disrupts a user's browsing experience.

What is Adware?

500

This major company suffered a phishing attack in 2013 that compromised the data of 40 million customers.

What is Target?

500

Malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic.

What is Distributed Denial-of-Service (DDoS)?

500

A network security that monitors and controls incoming and outgoing network traffic based on predetermined security rules - acts as a barrier between a trusted internal network and an unknown external network.

What is Firewall?

500

The _____ virus is considered the first computer virus. It was a self-replicating program that displayed the message, "I'M THE _____, CATCH ME IF YOU CAN" and spread across ARPANET.

What is Creeper?

M
e
n
u