Scam Spotting 101
Hacker Tactics
Passwords & Access
Phishing & Dropped Media
AI or Real?
100

This scam starts with a fake love story and ends with a request for money

What is a romance scam?

100

Hackers first gather employee names or peek in windows to look for clues.

What is recon (reconnaissance)?

100

A good password has at least this many characters and includes numbers, symbols, and letters.

What is 12?

100

Always do this before clicking on a link in an email.

What is hover over the link?

100

AI videos rarely last longer than this many seconds without a camera cut.

What is 8-10 seconds?

200

“Grandma, it’s me! I’m in trouble in Mexico and need $1,000” is an example of this scam.

What is a grandparent scam?

200

This device looks like a charger but can hack your computer.

What is an O.MG cable?

200

This tool helps you create and manage strong, unique passwords.

What is a password manager?

200

A hacker might leave this in a parking lot, hoping someone plugs it in.

What is a USB?

200

In an AI photo or video this may appear jumbled or confusing.

What is text?

300

This tactic creates pressure by making the victim feel they must act immediately or face serious consequences.

What is urgency?

300

The hacker gets into a low-level account, then looks for ways to gain more control.

What is privilege escalation?

300

If you use a weak password you may be vulnerable to this type of attack.

what is brute force?

300

This USB-like tool acts like a keyboard and types out attack commands.

What is a Rubber Ducky?

300

AI image generators often struggle to make these body parts look correct.

What are hands?

400

A caller claims to be from the IRS or Medicare and demands payment using gift cards to avoid arrest or service cancellation.

What is a government impersonation scam?

400

After stealing data or locking down systems, the hacker deletes logs and tools to avoid being traced.

What is cleanup?

400

It's a good idea to do this often, especially when after hearing about a data breach

what is changing your passwords?

400

These red flags often appear in phishing emails: [list two].

What are spelling errors, mismatched URLs, urgent language, unknown attachments?

400

The act of using AI to recreate someone's voice

What is voice cloning?

500

This scam tactic manipulates emotions by pretending to be a loved one in distress, often using voice cloning or stolen social media info.

What is familiarity?

500

If the attacker compromises one account and uses it to access others or gain higher privileges, this tactic is being used.
 

What is privilege escalation or lateral movement?

500

This extra step after typing your password keeps your account safer by asking for a code or phone check.

What is Multi-factor Authentication? (MFA)

500

You should do this when you receive an unexpected link from your bank in an email.
 

What is go to a trusted channel, or go to the source?

500

In AI-generated videos, this issue happens when the person or background changes between shots — like someone suddenly wearing different clothes or a building disappearing.

What is Continuity error?

M
e
n
u