Passwords of the Damned
Phantom Phishers
Haunted Hardware
Trick or Threat
Legends of the Dark Web
100

This is the most common mistake users make when creating passwords.

What is reusing the same password across accounts?

100

Phishing most often happens through this communication method.

What is email?

100

This type of device connects your home gadgets but can also open doors for hackers.

What is an IoT device?

100

A hacker renames all your desktop icons to “BOO!”

What is a prank (trick)?

100

The dark web is only accessible through this special browser.

What is Tor?

200

Cyber experts recommend this many characters for a strong password.

What is at least 12–16 characters?

200

This is the term for phishing via text message.

What is smishing?

200

A “zombie computer” is another term for this infected machine.

What is a bot?

200

Your files are encrypted, and a note says, “Send Bitcoin or else.”

What is ransomware (threat)?

200

This type of currency is the lifeblood of dark web transactions.

What is cryptocurrency / Bitcoin?

300

This authentication method requires “something you know” and “something you have.”

What is multi-factor authentication (MFA)?

300

The first step in avoiding phishing is checking this in the email header.

What is the sender’s domain / email address?

300

This device stores your secrets but can be wiped by a “haunted magnet.”

What is a hard drive?

300

A coworker posts their work badge on social media.

What is an insider security risk (threat)?

300

True or False: Everything on the dark web is illegal.

What is false?

400

If your password manager gets “possessed,” it’s best to do this immediately.

What is change all your passwords / revoke access tokens?

400

This type of phishing targets one high-value person—often an executive.

What is whaling?

400

When your webcam light turns on unexpectedly, you might be facing this type of attack.

What is remote access / webcam hijacking?

400

Your colleague sends you a file titled “SpookyPartyPics.exe.”

What is a malware attempt (threat)?

400

Marketplaces on the dark web often sell these types of stolen goods.

What are credentials, credit cards, personal data?

500

This famous 2022 incident involved leaked source code due to a hardcoded password “ghp_...”

What is the Uber hack / GitHub token breach?

500

This Halloween-themed phish might read: “Click here to claim your free pumpkin spice latte!” — Identify the red flag.

What is a suspicious link / urgency tactic?

500

Ghosts aren’t real, but this kind of invisible “specter” vulnerability was discovered in processors in 2018.

What is Spectre / Meltdown?

500

A hacker replaces your company’s homepage with a dancing skeleton GIF.

What is defacement (threat)?

500

The name of the FBI operation that shut down the infamous “Silk Road.”

What is Operation Onymous?