A
B
C
D
E
100

It’s a segment of the internet hidden from view, not showing up in search results or accessible through regular web browsers.

Dark Web

100

dangerous and illegal prank where someone makes a false report of a serious crime, such as a hostage situation or active shooter, in order to send a SWAT team or other law enforcement officers to a targeted location

Swatting

100

Used to create unique passwords for logins

Password Generator

100

 hackers pretend to be real companies to fool people into sharing private information like personal details, bank account info, and passwords.

Phishing

100

a software application designed to store and manage online credentials.

Password Manager

200

makes going online safer and more private by stopping people from seeing who you are, where you are, or what you’re looking at.

VPN

200

DAILY DOUBLE

When two forms of authentication is used to access an account.

2 FA

200

provided by search engines  to filter out explicit or inappropriate content from search results.

SafeSearch

200

when someone or something pretends to be something else in an attempt to gain a victim’s confidence, get access to a system, steal data, or spread malware

Spoofing

200

the fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords or credit card numbers.

Smishing

300

recreated media of a person’s appearance and/or voice by a type of artificial intelligence called deep learning

Deepfake

300

collection of practices, technologies, and concepts that shield any Internet-connected software or hardware we use from online threats.

Internet Security

300

the redirection of web traffic from legitimate sites to a fake sites for the purpose of stealing

Pharming

300

refers to data that can be used on its own or in conjunction with other information to identify, contact, or locate a single person.

PII

300

the methods cybercriminals use to get victims to take some sort of questionable action, often involving a breach of security, the sending of money, or giving up private information.

Social Engineering

400

when a criminal obtains or uses the personal information; e.g. name, login, Social Security number, date of birth, etc., of someone else to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way.

Identity Theft

400

the act of publishing someone’s personal, confidential information on the internet, often with malicious intent.

Doxxing

400

form of malware that hides on your device and steals its computing resources in order to mine for valuable online currencies like Bitcoin.

Crypto jacking

400

take advantage of software vulnerabilities, hidden in the code of the OS and its applications, which cybercriminals use to gain illicit access to your system.

Exploits

400

when someone takes pictures and information from other people and makes up a fake identity.

Catphishing