Cybersecurity
Scams

Tools Scammers Use.
Potpourri of Scams
Protect yourself
100

What is the motive for a cybersecurity attack?

What is money and power? 

They wouldn't do it if it didn't work. 

100

The Lottery Scam is attempting to get this information from you. 

What is personal information? 

100

Automated calls that look for a live person to answer the phone.  They often prompt you to answer "yes" with questions like, "Can you hear me?". 

What is a Robo Call? 

100

Gift cards, Cash-Apps, and Crypto Currency should be considered as ________ when you trade with them. 

What is cash?  

100

Complete this quote.  "If it is too good to be true..."

What is "it is"? 

200

Cybersecurity refers to protecting this. 

What is personal information?  This includes SS, Credit, or Account Numbers.  It also includes other personal information a hacker could use to impersonate you.   

200

The Grandparent scam

What is a scam where the scammer pretends to be your child or grandchild or someone you know from the past? 



200

When a scammer uses technology that makes the caller ID appear to be one from a known company is known as....

What is ID Spoofing?

200

You should contact this company/organization first if you have given your credit or debit card information to a scammer.

Who is the issuing financial institution (Bank, Credit Union, Credit Card Company)?

File a fraud claim with the issuer.  With most classes of fraud, the issuer will give you credit quickly. 

200

Name 2 red flags that will help you avoid scammers.

What is:

Spelling/Grammer errors

Urgent 

Generic Greatings 

Links do not match the company 

Request for personal information

Too Good To Be True

300

The government agency that protects consumers and promotes fair competition in the marketplace.  Part of its mission to protect consumers is fighting cyber crimes.  

What is the Federal Trade Commission? 

300

This scam, either on the phone, by text, or by email, pretends to be a known and trusted organization.

What is an Imposter Scam? 

This could include Medicare, the Internal Revenue Service (IRS), or the Social Security Administration (SSA).

300

Name one of the ways a cybercriminal could capture a voice so they can use AI to clone your speech. 

What are Robo Calls or Online Videos? 

It takes less than 2 minutes for AI to learn your voice. 

300

In 2023 the percentage of adults that are considered digital consumers was:  a) 95% b) 82% c) 71%

What is b) 82%? 

300

This system is currently the best way to keep your online account safe. 

What is Multi-factor Authentication?

400

How much more likely are older Americans to fall victim to cyber scams?  a) Age doesn't matter, everyone is at risk  b) 3 times more likely  c)  less likely because older Americans do not often make purchases online

What is b) 3 times more likely? 

400

This attack plays on a person's desire for relationships.  It is often a "long con" and can come in many forms of relationship.

What Online Romance?

Online romance refers to any relationship be it romantic or friendship.  

400

While reading an online article about how the Dallas Cowboys will turn the season around, a picture appears telling you that you've won 2 tickets to next week's game.  Just click the button to claim your prize.  This is known as a... 

What is a Pop-Up? 

400

Hacktivists are hackers who attack companies and governments for political or social causes.  Similarly, these criminals play off our desire to help people when disaster strikes.  This is known as...  

What is the Charity Scam?  

400

This emotional technique is the trick all scammers use to motivate their victims.  

What is urgency?  

500

How much money was lost last year due to cyber crime?

Over 10 billion dollars

500

Bob is looking to make some extra money to make ends meet.  He comes across a great opportunity to make some extra cash and he only needs to accept a deposit and transfer the funds in 3 days.  What type of scam did Bob fall for? 

What is a Money Mule? 
500

This is a type of online scam that targets consumers by sending them an e-mail that appears to be from a well-known source – an internet service provider, a bank, or a mortgage company, for example. It asks the consumer to provide personal identifying information. 

What is a phishing scam?

500

A video of a person in which their face or body has been digitally altered so that they appear to be someone else.  They are typically used maliciously or to spread false information.

What is deep fake technology?

500

Third-Party Verification.

What is the easiest way for you to protect yourself from criminals every day? 


M
e
n
u