A scammer creates a fake email and sends it to thousands of people, hoping some of them will click on a link and give up their personal information.
What is Phishing?
This service allows users to remain anonymous, masking their identity/location and encrypts traffic.
What is a VPN?
Cybercrime went up 600% due to this ongoing event
What is the Pandemic / COVID-19 / Coronavirus?
Within Proofpoint, VAP is an acronym for...
A. Vulgar Aggressive Persons
B. Verily Anonymous Protocol
C. Very Attacked People
D. Verified Acronym Proof
An independent malware program that self-replicates in order to spread from machine to machine to cause damage.
What is a (computer) worm?
TAP is an acronym for Proofpoint's threat dashboard tool.
What is Targeted Attack Protection?
(Source: https://www.proofpoint.com/us/products/advanced-threat-protection/targeted-attack-protection)
This age generation is currently the most impacted by cybercrime.
What are Millennials?
Our flagship customer event live and in person in New York on September 6-7, 2023
A. Wisdom
B. Element
C. Knight
D. Protect
This attack type is frequently associated with BazaLoader malware and is often referred to as BazaCall. Both attack types are what Proofpoint considers to be the acronym TOAD.
What is Telephone Oriented Attack Delivery?
In this country, over 130 large-scale cyber attacks occur each year.
What is the United States?
The most common types of access sold on the Dark Web are valid credentials for
Remote Desk Protocol
RDP
This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets).
What is Distributed Denial of Service (DDoS)?
This is a method of access control by which users must present multiple, separate pieces of identification, such as a password and keycard, in order to access a system.
What is multi-factor authentication?
Over the last year, malware on this operating system has gone up by 165%
What is MacOS?
This ex-government employee is famous for leaking classified cybersecurity information from the National Security Agency in 2013.
Edward Snowden
Criminals access someone's computer and encrypt the user's personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files.
What is Ransomware?
(Source: https://www.pewresearch.org/internet/quiz/cybersecurity-knowledge/)
When a URL has this at the beginning, it means that the information entered into the site is encrypted
What is "https"?
(Source: https://www.pewresearch.org/internet/quiz/cybersecurity-knowledge/)
According to Help Net Security, average price of hacked credit card with CVV
According to Kaspersky, who recently analyzed nearly 200 posts on the Dark Web selling access to corporate networks, access usually averages:
$3k