Holiday Online Shopping
Security Scramble
Seasonal Scams & Social Engineering
Past Presentations
Holiday Travel Cyber Risks
100

This type of fake website often pops up during holiday sales, offering deals “too good to be true” to steal your payment info.

What is a spoofed shopping site / fake e-commerce site?

100

RIFEALWL

What is FIREWALL?

100

Scammers often impersonate charitable organizations during the holidays to solicit fake donations; this practice is known as this.

What is charity fraud?

100

Attackers exploit USB charging ports and cables to steal data or install malware.

What is Juice Jacking?

100

Travelers should avoid logging into sensitive accounts on these often-unsecured networks commonly found in airports and hotels.

What are public Wi-Fi networks?

200

Security experts recommend enabling this extra security login capability, especially on retailer accounts, before buying gifts online.

What is multi-factor authentication (MFA) / two-factor authentication (2FA)?

200

ONSOIPGF

What is SPOOFING?

200

Attackers send texts claiming holiday delays from UPS, FedEx, or USPS; these fraudulent messages belong to this attack category.

What is smishing (SMS phishing)?

200

This is a model that allows attackers to access advanced phishing tools to launch sophisticated phishing attacks with minimal hacking skills.

What is Phishing as a Service (PhaaS)?

200

Criminals may set up fake “Free Holiday Wi-Fi” hotspots in busy transit hubs; these are called this kind of access point.

What is an evil twin hotspot?

300

Cybercriminals send fake “Your package couldn’t be delivered” emails to trick shoppers into clicking malicious links; this is a form of this attack technique.

What is phishing?


300

SOAEWRARNM

What is a RANSOMWARE?

300

Fraudsters who call pretending to be family members needing emergency holiday funds are using this emotional manipulation tactic.

What is the “family emergency” scam / impersonation scam?

300

This type of attack happens when malicious code is delivered simply by visiting a website. No clicks or downloads needed. 

What is a Drive-By Compromise?

300

This protective tool creates an encrypted tunnel for safe browsing when traveling for the holidays.

What is a VPN (Virtual Private Network)?

400

Before entering credit card info on a holiday shopping site, users should always check for this five-letter acronym in the browser’s address bar.

What is HTTPS?


400

RINNOEPTCY

What is ENCRYPTION?

400

Many holiday-themed phishing emails use this type of urgent language strategy to pressure victims into acting quickly without thinking.

What is creating a sense of urgency?

400

A web trick where a harmless-looking page you opened earlier changes to a fake login page while it's in the background tab.

What is Tabnabbing?

400

Leaving Bluetooth enabled while holiday shopping or traveling can expose devices to this type of proximity-based attack.

What is a Bluetooth hijacking attack (e.g., bluesnarfing / bluejacking)?

500

These are temporary digital payment numbers, offered by some banks, that can protect shoppers by keeping real card info hidden during holiday purchases.

What are virtual card numbers / single-use card numbers?


500

YLVLITRAUBNEI

What is VULNERABILITY?

500

When attackers gather personal details from social media holiday posts to make scams more believable, they're exploiting this type of information.

What is open-source intelligence (OSINT)?

500

A cryptographic attack where an attacker abuses a security feature of hash algorithms, which are used to verify the authenticity of messages and exploits the logic behind the "birthday problem".

What is a Birthday Attack?

500

When a malicious actor silently intercepts data between a traveler and a legitimate website, it’s known as this classic attack.

What is a man-in-the-middle (MITM) attack?