"Hall of Shame" (Famous Breaches)
Acronym Soup
Name That Attack
Hackers in Hollywood
Tech Support Nightmares
100

This retail giant was hacked in 2013 via their HVAC vendor, leaking 40 million credit cards.

What is Target

100

What does MFA stand for?

What is Multi-Factor Authentication 

100

This common attack involves sending fraudulent emails that appear to come from a reputable source to steal sensitive info

What is Phishing

100

In The Matrix, what color is the pill Neo takes to see the truth?

What is Red

100

The first rule of IT support: "Have you tried turning it _____?"

What is Off and on again

200

In 2017, this credit bureau failed to patch Apache Struts, leaking data on 147 million Americans

What is Equifax

200

What does VPN stand for?

What is Virtual Private Network 

200

In this type of attack, a hacker encrypts a victim's files and demands payment (usually crypto) to unlock them

What is Ransomware

200

In Hollywood movies, no matter how complex the NSA security system is, the hacker always finishes the job by hitting one final key and whispering this two-word phrase.

What is "Im In"

200

What is the IP address 127.0.0.1 commonly called?

What is Localhost

300

The "WannaCry" ransomware attack famously used an exploit developed by which agency?

What is The NSA - EternalBlue 

300

What does DDoS stand for?

What is Distributed Denial of Service 

300

This attack involves flooding a website with so much junk traffic that it crashes and real users can’t access it.

What is a DDos attack

300

In the movie The Social Network, Mark Zuckerberg creates the site "FaceMash" by hacking into the student directories of which university?

What is Harvard
300

To test if a server is online, IT pros use this 4-letter command which sends ICMP packets to the target and waits for a reply.

What is ping

400

For the last 10 years, this string of numbers has remained the #1 most common password in the world.

What is 123456

400

What does OSINT stand for?

What is Open Source Intelligence 

400

This happens when an attacker secretly intercepts and relays communications between two parties who believe they are talking directly to each other (common on public Wi-Fi).

What is a Man-in-the-Middle attack

400

In Jurassic Park, Lex saves the day by hacking the door locks, famously saying, "It's a _____ system! I know this!"

What is Unix

400

An IP address can change, but this 12-character alphanumeric address is physically hard-coded into the network card and generally stays the same

What is the MAC address

500

The first ever "computer worm" released in 1988 was named after this grad student.

What is The Morris Worm / Robert Morris 

500

What does XSS stand for?

Cross-Site Scripting

500

This automated attack takes millions of username/password pairs stolen from one data breach and tests them against other websites (like Netflix or Uber) to see if users reused their credentials.  

What is Credential Stuffing 

500

In the HBO show Silicon Valley, Gilfoyle creates a chat bot to talk to his coworkers so he doesn't have to. What is the bot's name?

What is Anton

500
What do you press to save and exit VIM

What is "Esc + :wq"

M
e
n
u