This is the most common mistake users make when creating passwords.
What is reusing the same password across accounts?
Phishing most often happens through this communication method.
What is email?
This type of device connects your home gadgets but can also open doors for hackers.
What is an IoT device?
A hacker renames all your desktop icons to “BOO!”
What is a prank (trick)?
The dark web is only accessible through this special browser.
What is Tor?
Cyber experts recommend this many characters for a strong password.
What is at least 12–16 characters?
This is the term for phishing via text message.
What is smishing?
A “zombie computer” is another term for this infected machine.
What is a bot?
Your files are encrypted, and a note says, “Send Bitcoin or else.”
What is ransomware (threat)?
This type of currency is the lifeblood of dark web transactions.
What is cryptocurrency / Bitcoin?
This authentication method requires “something you know” and “something you have.”
What is multi-factor authentication (MFA)?
The first step in avoiding phishing is checking this in the email header.
What is the sender’s domain / email address?
This device stores your secrets but can be wiped by a “haunted magnet.”
What is a hard drive?
A coworker posts their work badge on social media.
What is an insider security risk (threat)?
True or False: Everything on the dark web is illegal.
What is false?
If your password manager gets “possessed,” it’s best to do this immediately.
What is change all your passwords / revoke access tokens?
This type of phishing targets one high-value person—often an executive.
What is whaling?
When your webcam light turns on unexpectedly, you might be facing this type of attack.
What is remote access / webcam hijacking?
Your colleague sends you a file titled “SpookyPartyPics.exe.”
What is a malware attempt (threat)?
Marketplaces on the dark web often sell these types of stolen goods.
What are credentials, credit cards, personal data?
This famous 2022 incident involved leaked source code due to a hardcoded password “ghp_...”
What is the Uber hack / GitHub token breach?
This Halloween-themed phish might read: “Click here to claim your free pumpkin spice latte!” — Identify the red flag.
What is a suspicious link / urgency tactic?
Ghosts aren’t real, but this kind of invisible “specter” vulnerability was discovered in processors in 2018.
What is Spectre / Meltdown?
A hacker replaces your company’s homepage with a dancing skeleton GIF.
What is defacement (threat)?
The name of the FBI operation that shut down the infamous “Silk Road.”
What is Operation Onymous?