Malware
Phishing
Cryptography
Real-Life Events
Misinformation and Impersonation
100

This type of malware holds your data until you pay a fee.

What is ransomware?

100

One of the most common examples of Phishing today is from the DMV warning about what?

What are unpaid tolls?

100

While commonly used in refernce to social media, this guides the mathematical procedures for both encryption and decryption processes. 

What is an algorithm?

100

This worm, allegedly from the US and Israel, targeted Natanz, an Iranian nuclear plant, and escaped outside the facility.

What is Stuxnet?

100

This is mimicking a legitimate brand or company, often associated with phising attacks.

What is brand impersonation?

200

This is a virus that is capable of self-replicating.

What is a worm?

200

Vishing is short for this type of phising done by phone call.

What is voice phising?

200

This is the practice of intentionally making something unclear or difficult to understand.

What is obfuscation?

200

In 2009, Fannie May would have lost all of their data due to this type of delayed attack set by a disgruntled employee if they hadn't spotted it in time.

What is logic bomb?

200

This is intentionally false information spread for malicious reasons.

What is disinformation?

300

This type of malware, named after something in Greek mythology, is known for looking harmless. 

What is a Trojan?

300

This type of phising is personalized to the target.

What is spear fishing?

300

This is the practice of hiding information in order to prevent its detection.

What is steganography?

300

An example of this was when Chad Scira was able to get infinte Chase Rewards Points from this company by transferring points from a negative account into a positive one. 

What are race conditions?

300

This is a social engineering attack in which an attack follows after someone in order to get into a locked area.

What is tailgating?

400

These are applications preloaded on your device to slow it down.

What is bloatware?

400

SPIM is short for this type of phising seen with apps such as Discord.

What is Spam over Internet Messaging?

400

This is a software-based solution that facilitates the generation, storage, distribution, and management of cryptographic keys.

What is a key management system?

400

iPhone products bricked when set to this date because of interger overflow. 

When is January 1, 1970?

400

This is a type of cyberattack where an attacker uses a business email account for fraudeulent activities. 

What is a Business Email Compromise (BEC)?

500

This is software that is not inheritenly malicious, but can be used to bypass security controls. 

What is a backdoor?

500

John Podest, a member of Hillary Clinton's campaign, was a whaling victim of this Russian hacking group.

What is Fancy Bear?

500

This cryptographic tool is a hardware-based security chip or module embedded in a computer's motherboard.

What is a Trusted Platform Module (TPM)

500

Printers have started secretly added these to every printed page to track users in case the papers are used for crimes.

What are tiny, yellow dots?

500

This is simply a deception and can be humorous or malicious.

What is a hoax?

M
e
n
u