SCAM
Antivirus software & Cyberwarfare attacks
Social engineering
Methods of social engineering
Encryption, its types, usage, importance.
200

 How did the word SMISHING appear? When?

SMS + Phishing 

 1990

200

Name the most efficient antivirus.

Bitdefender

200

What is social engineering in terms of IT?

It's a manipulation technique that exploits human errors to gain private information access or valuables.

200

REBUS!

SCOOF!!!!!

300

UNLUCKY

(NEVEZUHA) 

U HAVE BEEN SCAMMED FOR 300 BUCKS

...

300

How does the antivirus work? (Do not overthink, it's quite easy)

Antivirus products work by detecting, quarantining and/or deleting malicious code, to prevent malware from causing damage to your device.

300

Describe (actually try to guess) the term "Honey trap"? (kind of social engineering attack)

In a honey trap attack, the perpetrator pretends to be romantically or sexually interested in the victim and lures them into an online relationship. The attacker then persuades the victim to reveal confidential information or pay them large sums of money.

300

What is END-TO-END ENCRYPTION? Try to explain how it works. 

End-to-end encryption (E2EE) is a secure communication process that prevents third parties from accessing data transferred from one endpoint to another. Data encryption is the process of using an algorithm that transforms standard text characters into an unreadable format.

400

Name (and explain) all the kinds of scam u know (50$ for each)

1) Shouldering - It occurs when someone surreptitiously watches over your shoulder to nab valuable information.

2) Pharming - It redirects website traffic to fraudulent websites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams.

3) Phishing - This tactic includes deceptive emails to steal information.

4) Baiting - It's an online and physical social engineering attack that promises the victim some gain.

5) Spear Phishing - A spoofed email is used to carry out targeted attacks against individuals or businesses.

6) Vishing - It is voice solicitation over the phone (voice +phishing)

7) Tailgating - It relies on human trust to give the criminal physical access to a secure building or area.

8) Rogue Antivirus - Victims are tricked into believing that malware is installed on their computer and that if they pay, the malware will be removed.

400

What of the following statements is false?

1) Hackers managed to gain access to the emails of Democratic presidential candidate Hillary Clinton and her team during the 2016 USA presidential election and leak EXTREMELY vital info

2) An unemployed man hacked the Pentagon in 2001 and 2002 (one more time)

3) A man from Taiwan accidentely invented a virus that caused hunger among all animal shelters in the country  

The 3rd one.

400

Repetition is the mother of learning (50$ for each)

deceptive            javelin, pike

spear                  fake, false

baite                   reward

gain                    catch, take

solicitation           misleading

fraudulent            simulate, pretend

spoof                   decoy

nab                      extortion

deceptive/misleading

spear/javelin, pike

bait/decoy

gain/reward

solicitation/extortion

fraudulent/fake, false

spoof/simulate, pretend

nab/catch, take


400

Name 2 kinds of encryption and describe them. (half $ for naming only)

SYMMETRIC encryption and ASYMMETRIC encryption. 

Symmetric encryption is a type of encryption key management solution where only one key (a secret key) is used to both encrypt and decrypt electronic data. 

Asymmetric encryption, also known as public key encryption, uses a public key-private key pairing: data encrypted with the public key can only be decrypted with the private key.

500

How much did Facebook pay researchers to develop a technique for detecting targeted phishing? (approximately)

100000$ (if close enough u get 400$ if not the closest team gets 50% points)

500

Describe the first computer virus in the world (as much info as possible)

The world's first computer virus, known as CREEPER was first deployed on ARPANET networks in 1971 by Bob Thomas of BBN with the message “I'm the creeper, catch me if you can!” appearing on the screens of affected computers.

500

Describe the social engineering life cycle. Try to imagine that u are a scammer (4 stages, 100$ for each, 100$ extra for all points in one answer)

...

500

Decode this:

-.-.  ..  .--.  ....  .  .-.

CIPHER

M
e
n
u