This email asks for information, but doesn't seem quite right
What is Phishing?
This malware is installed on computers to help attackers find Bitcoin
What is Cryptomining?
This malicious threat comes from inside the organisation
What is an insider threat?
This is Amazon's IoT device for home automation and more
What is Echo?
This form of cloud computing provides a platform and environment to let the developers build apps and services over the internet.
What is PaaS?
This process is used when you need to use a secondary method, as well as your password, to access a network or application
What is two factor authentication?
This malware requires no human interaction to use computer networks to spread to other machines
What is a worm?
This company is known for its vast knowledge of Advance Persistent Threat actors and the quality of it's cyber threat intelligence
Who is FireEye?
This Japanese sounding website is used to surf the internet for Things, rather than devices
What is Shodan?
This attack makes network resources unavailable by disrupting services of a host connected to the internet
What is a Denial of Service attack?
This is the easiest way for an attacker to get malware onto your computer
What is email?
This threat actor works for a well known state-sponsored organisation
What is an Advanced Persistent Threat?
These machines are considered the first IoT devices, going online as far back as 1974
What is an ATM?
This cloud provider services Australian government and Critical National Industry
Who is AUCloud?
This is used to disguise a message or information, so that only authorised parties can access it
What is encryption?
This type of malware masquerades as legitimate files or software but contains malicious code
What is a Trojan?
Born in 1963, this man began hacking at age 16, when he learned to bypass the Los Angeles bus ticket-punching system, allowing him to ride any bus for free. Arrested in 1995 for wire fraud, and having spent 5 years in prison, he is currently considered the most notorious hacker in the world
Who is Kevin Mitnick?
This system includes the letters from A to F to make up a 16-character numeral system
What is Hexadecimal?
Coming to light in 2017, this worldwide cyber attack affected more than 200,000 computers across 150 countries. Although stopped within days of its execution, worldwide damages are claimed to be in the Billions of dollars
What is WannaCry?
This Chinese APT(41) was recently identified as being involved in both espionage and financial crimes
Who is Double Dragon?
Born in xxxx, he was educated in the UK and co-founded a successful tech company there before coming to Australia in xxxx, where his company recently achieved VMWare Cloud Verified Status.
Who is Phil Dawson?