Historical Hacks
Phishing Frenzy
You've Been Hacked
It was an Inside Job
Mobile Madness
100

This 2013 breach of a large retailer compromised over 40 million credit cards.

Target

100

These are known as attack vectors in an email.

Link or Attachment

100

If you believe your computer is behaving suspiciously, this is the first thing you should do.

Report the incident to IT/Cybersecurity

100

An employee accidentally sending sensitive data to the wrong recipient is an example of this kind of insider threat.

Unintentional insider threat

100

Avoid installing mobile apps not from this source.

Official App Store

200

This 2017 ransomware spread globally using EternalBlue.

WannaCry

200

This kind of phishing targets specific individuals or groups.

Spear Phishing

200

Your files are encrypted, and a ransom is demanded to unencrypt them. What kind of attack is this?

Ransomware

200

This tool prevents employees from sending company data to a personal computer.

DLP (Data Loss Prevention)


200

Many mobile devices use this feature, which uses your face, finger, or other parts of your body to grant access.

Biometrics

300

The breach of this credit agency in 2017 affected over 140 million Americans.

Equifax

300

This phishing attack targets very high importance individuals such as C-Staff.

Whaling

300

You are starting to see a lot of pop-up ads across different sites you frequent that didn’t used to be there. What is the possible attack?

Adware

300

This term describes employees intentionally leaking data for revenge or profit.

Malicious Insider

300

The data on a mobile device should always be ____ in case it is lost or stolen.

Encrypted

400

This 2020 supply chain attack compromised U.S. federal agencies.

SolarWinds Orion Attack

400

These fake login pages are designing to steal credentials.

Credential Harvesters

400

This attack steals your data and exfiltrates it to collect information about you.

Spyware

400

Allowing employees to access only the tools and files they need for work is an example of ___.

Principles of Least Privilege

400

This control allows IT admins to control, secure, and enforce policies on company-owned smartphones, tablets, and other devices.

MDM (Mobile Device Management)

500

This notorious breach in 2017 involved exfiltration of tools from the NSA itself.

Shadow Brokers Leak

500

This technique of phishing via a phone call is called ___.

Vishing

500

Hackers often install this secret way to access your account or environment.

Backdoor

500

What percentage of insider threat incidents involve malicious intent? A: 15%, B: 28%, C: 55%, D: 83%

28%

500

This feature of many mobile devices is a great way to connect to the internet while avoiding connecting to unsecured networks on the go.

Mobile Hotspot