How did the word SMISHING appear? When?
SMS + Phishing
1990
Name the most efficient antivirus.
Bitdefender
What is social engineering in terms of IT?
It's a manipulation technique that exploits human errors to gain private information access or valuables.
REBUS!
SCOOF!!!!!
UNLUCKY
(NEVEZUHA)
U HAVE BEEN SCAMMED FOR 300 BUCKS
...
How does the antivirus work? (Do not overthink, it's quite easy)
Antivirus products work by detecting, quarantining and/or deleting malicious code, to prevent malware from causing damage to your device.
Describe (actually try to guess) the term "Honey trap"? (kind of social engineering attack)
In a honey trap attack, the perpetrator pretends to be romantically or sexually interested in the victim and lures them into an online relationship. The attacker then persuades the victim to reveal confidential information or pay them large sums of money.
What is END-TO-END ENCRYPTION? Try to explain how it works.
End-to-end encryption (E2EE) is a secure communication process that prevents third parties from accessing data transferred from one endpoint to another. Data encryption is the process of using an algorithm that transforms standard text characters into an unreadable format.
Name (and explain) all the kinds of scam u know (50$ for each)
1) Shouldering - It occurs when someone surreptitiously watches over your shoulder to nab valuable information.
2) Pharming - It redirects website traffic to fraudulent websites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams.
3) Phishing - This tactic includes deceptive emails to steal information.
4) Baiting - It's an online and physical social engineering attack that promises the victim some gain.
5) Spear Phishing - A spoofed email is used to carry out targeted attacks against individuals or businesses.
6) Vishing - It is voice solicitation over the phone (voice +phishing)
7) Tailgating - It relies on human trust to give the criminal physical access to a secure building or area.
8) Rogue Antivirus - Victims are tricked into believing that malware is installed on their computer and that if they pay, the malware will be removed.
What of the following statements is false?
1) Hackers managed to gain access to the emails of Democratic presidential candidate Hillary Clinton and her team during the 2016 USA presidential election and leak EXTREMELY vital info
2) An unemployed man hacked the Pentagon in 2001 and 2002 (one more time)
3) A man from Taiwan accidentely invented a virus that caused hunger among all animal shelters in the country
The 3rd one.
Repetition is the mother of learning (50$ for each)
deceptive javelin, pike
spear fake, false
baite reward
gain catch, take
solicitation misleading
fraudulent simulate, pretend
spoof decoy
nab extortion
deceptive/misleading
spear/javelin, pike
bait/decoy
gain/reward
solicitation/extortion
fraudulent/fake, false
spoof/simulate, pretend
nab/catch, take
Name 2 kinds of encryption and describe them. (half $ for naming only)
SYMMETRIC encryption and ASYMMETRIC encryption.
Symmetric encryption is a type of encryption key management solution where only one key (a secret key) is used to both encrypt and decrypt electronic data.
Asymmetric encryption, also known as public key encryption, uses a public key-private key pairing: data encrypted with the public key can only be decrypted with the private key.
How much did Facebook pay researchers to develop a technique for detecting targeted phishing? (approximately)
100000$ (if close enough u get 400$ if not the closest team gets 50% points)
Describe the first computer virus in the world (as much info as possible)
The world's first computer virus, known as CREEPER was first deployed on ARPANET networks in 1971 by Bob Thomas of BBN with the message “I'm the creeper, catch me if you can!” appearing on the screens of affected computers.
Describe the social engineering life cycle. Try to imagine that u are a scammer (4 stages, 100$ for each, 100$ extra for all points in one answer)
...
Decode this:
-.-. .. .--. .... . .-.
CIPHER