Passwords Passwords Passwords
Get Phished?
Online Privacy
Engineered, but Socially
Haxx
100

This site can be used to determine if your email may have been involved in a breach

What is haveibeenpwed?
100

Phishing emails frequently come from addresses that look similar to real ones but have small differences. This part of the email should be checked closely.

What is the sender’s email address?

100

This is the name of the settings that determine who can see your information on social media platforms.

What are Privacy settings?

100

This term describes the use of psychological manipulation to trick people into giving away confidential information.

What is social engineering?

100

This term describes a collection of related web pages that are accessed through a common domain name or URL.

What is a website?

200

This is used to manage a user’s passwords across various accounts.

What is a password manager?

200

Phishing emails often have this type of message, urging the recipient to act quickly to prevent something bad from happening

What is an urgent message?

200

This is the act of publicly providing personally identifiable information about an individual or organization, usually via the Internet and without their consent.

What is Doxxing?

200

This social engineering technique involves making up stories to get you to share personal information.

What is Baiting?

200

This type of firewall specifically protects web applications by filtering and monitoring web traffic.

What is a Web Application Firewall?

300

This number is a good starting point for password length.

What is 16 characters?

300

Clicking on a link in a phishing email might take you to one of these fake sites designed to look real to steal user's passwords.

What is a credential harvesting page?

300

This type of platform, where users can post, share, and comment on content, can be a source of cybersecurity threats such as identity theft, cyberstalking, and data leakage if not used with caution.

What is Social Media?

300

Social engineers often pretend to be someone they’re not to gain trust. This technique is known as this.

What is pretexting?

300

This is the standard language used to create and design web pages.

What is HTML?

400

Passwords are commonly leaked through this

What are breaches?

400

Before clicking a link in an email, you should do this to see where the link actually goes.

What is hover over the link?

400

This term refers to data that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. It’s crucial to protect this to maintain online privacy.

What is Personal Information?

400

In this type of social engineering attack, an attacker promises a service or benefit in exchange for information or access.

What is quid pro quo?

400

This term describes the malicious practice of adding harmful code into a website to exploit it.

What is injecting bad code?

500

Passwords are recommended to have this following quality per service.

What is unique?

500

This type of software might be installed on your computer if you open an attachment from a phishing email.

What is malware?

500

This term refers to the trail of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services.

What is your Online Footprint

500

When a social engineer physically follows someone into a restricted area by pretending to be authorized, this tactic is called this.

What is tailgating?

500

Finding and fixing these weaknesses in websites can prevent hackers from exploiting them.

What are vulnerabilities?

M
e
n
u