"NETWORK" NEWS
FACTS ON FACTORS
PHREAK ME OUT
POTPOURRI
BEFORE & AFTER
ITS ALL GREEK TO ME
200

Recently, computers around the world went down during an update.  It was not a security event, but was instead an accident by this well known security vendor.

Who is Crowdstrike?

200

This earliest computer authentication method, is being phased out, by companies like, Google, Microsoft, Oracle, and Conner Strong & Buckelew.

What is a password?

200

The Phirst modern hackers hacked these phun telecommunications devices, giving the late Bell company odgena.

What are Phones?

200

Alan Turing was an English mathematician, computer scientist, and philosopher. Considered to be the father of theoretical computer science, Turing played a crucial role in cracking the code of Enigma, an encryption machine used in this war.

What is World War II?

200

Website tool to track activity by Sesame Street baked treat icon.

What is Browser (or web, website) Cookie Monster?

200

Microsoft's authentication token that protects against eavesdropping and replay attacks, is named after this mythical dog with three heads.

What is Cerebos?  (Kerberos)

400

Daily Double!

What is MOVEit?

400

Its the use of your physical form or characteristic for authentication.

What is biometric authentication?

400

An early hacker who figured out how to trick pay phones using a special frequency, used a toy prize this popular cereal, whose crispy namesake keeps things ship shape!

What is Captain Crunch?

400

A "Honeypot" is one of many deception technologies used by security professionals to deceive whom?

Who are hackers?

400

80's doll craze apply updates to Microsoft's laptop operating system.

What is Cabbage patch Windows?

400

A Daemon is a backend process in Linux or Unix, the name chosen from the Greek word for this Halloween character. 

What is a spirit or ghost or demon?

600

This AI tool raised concerns among cybersecurity experts about its use by hackers when crafting more convincing phishing and social engineering attacks.

What is ChatGPT?

600

Security experts warned about this phenomenon, where users feel tired and overwhelmed by logging in. Sounding a bit like camouflage, it's "authentication" this.

What is authentication fatigue?

600

A voice phishing technique, with a not so clever name.

What is vishing?

600

This technology promises to revolutionize cybersecurity by enabling decentralized, tamper-proof ledgers for secure data sharing.

What is blockchain?

600

Equivalent to one Byte of a candy made from an Irish Bee's product.

What is Eight Bit O'Honey?

600

Named after the Greek messenger of the gods for its swift and stealthy action, this ransomware shares a name with a French luxury design house.

Who is Hermes?

800

It's the well known password manager company and tool that faced scrutiny over its encryption policies, many vulnerabilities, and how it handled users’ sensitive vault data.  For Halloween, it could also be the spooky name of final credentials you use to log in before you die!

Who or What is LastPass?

800

This more than improbable kind of travel may set off security alerts. Such as when your account logs in, from Camden, and five minutes later from New Zealand.  

What is impossible travel?

800

This notorious spyware can infect a smartphone via a simple text message or missed call, or it's the mythical flying horse.

What is Pegasus?

800

Daily Double!

What is a private key?

800

A large releases of information to Wikileaks using a vehicle for transporting and off-loading soil and gravel.

What is data dump truck?

800

From the Greek word for hidden or secret, it's used in disguising informaiton, which involves transforming it into an unreadable format, now a nickname for digital currency.

What is Crypto?

1000

Users in 2003 questioned the privacy of messages and location data after high-profile breaches were revealed in this company, whose new name "marks the spot."

Who is "X" or "Twitter?"

1000

Recently, researchers explored this futuristic form of biometric authentication, analyzing these unique chemical signatures emitted by individuals.

What are pheromones?

1000

Technically, the very first cyber attack occurred in this country in 1834, where two thieves stole financial market information by hacking the Telegraph System, possibly to corner the markets of Bordeaux or Fromage.

What is "France?"

1000

Botnet attacks increasingly target these types of devices, hijacking the growing number of internet connected everyday appliances and gadgets, in the office or around your home, in order to cause large-scale network disruptions.

What are Internet of Things (IoT) devices?

1000

This book has wonderful smells on different pages if activated with your fingernail as you collect the data travelling across the wires that connect your computers that resembles  a congestion of tiny autos on the highway.

What is Scratch n' Sniff the network traffic?

1000

While this word comes from the Latinized name of the Persian mathematician Al-Khwarizmi, the word "arithmos" (ἄριθμος), meaning number in Greek, relates to the role of these in computations and cybersecurity.

What is algorithm?

M
e
n
u