Scams
Personal Information
You've Been Had!
Social Media
General Cyber Safety
100

Frieda ordered a water bottle from Amazon, immediately after she places her order and pays for it, she receives a text telling her there was an error with her order and she needs to click the link to login to remedy it.

What does this situation describe?



A Wide Net

A scam artist sends out hundreds of the same message, hoping that at least one person will receive it and click the link

100

A Facebook post claims that “Most people can’t remember the name of their childhood street name after age 25!” Many people have commented with the names of their old street names. 

What could these street names be used for?

Possible answers:

  1. Password hacking

  2. Setting up an account in your name

  3. Locating personal information about you

100

Oh no! You’ve unwittingly clicked on the link from a spam email! What do you do now? 

A: Check to see if there are any programs or browsers you don’t recognize is running on your pc, run an antivirus scan, and restart your computer

B: Close the tab and move on with your day

C:Scream, then cry. Then move to Peru and proceed to live off the grid :)



A

100

You have recently passed your road test and received your N! You want to take a picture of you and your car with the N on it to post to your Instagram.

Should you?

No! With your license plate information someone could easily find more information about that you may not be willing to share with the public or possibly even incriminate you in a crime. If you must post a picture of your car, either blur out your license plate or leave it out entirely!

100

True or false: If your toaster could connect to the internet, could it be hacked?

Yes! Any smart device that can connect to the Internet and or communicates with other smart devices can be hacked and used to access other devices on the same network. 



200

Lisa receives an email from someone she works with saying "you have won a lottery for 300,000. click here to claim your prize" 

Is this a phishing or spear phishing attack?



Phishing!

200

You get a call from your bank asking you to “review and verify” some account information, as there has been some unusual activity. The caller number matches the local branch of your bank, when you check it out. The caller asks you to confirm your four-digit debit card passcode.

What technique is the caller using to make their phone number appear legit?

Phone spoofing

200

Name 1 resource you can use to educate yourself on scams

Example Answers:

  • RCMP Frauds and Scams website

  • ScamBusters 

  • Vancouver Police department crime and fraud prevention website

  • Canadian Anti-Fraud centre 

  • Government of Canada Cyber incident website

  • Consumer protection BC



200

Robert posts a picture of himself at a wild costume party in an embarrassing costume. A year later he remembers he posted the picture and deleted it from his account. Is this picture now permanently gone?  

No! Anything that is posted to the Internet will likely outlive you! Just because it was deleted does not mean it cannot be recovered. Think before you post!

200

True or False: A URL that has “HTTPS” at the beginning and the associated padlock symbol on the URL bar is a sure sign of a safe website.

False! While a URL with HTTPS does ensure communication with the website is secure, it does not guarantee that the website itself is safe!

300

John receives a strange email from his coworker Robert telling him that he needs him to download and review a document, despite there being no project requiring this. John obliges and downloads the document to check it over and sends it back to Robert.

2 hours later he is notified that the company’s network has been hacked and the company’s data is being held for ransom.

Name what just happened





John has unwittingly fallen for a spear phishing scam

300

You receive an e-mail with information about a work-from-home job for a charity. You look up the charity and it seems legit. The e-mail asks you to follow a survey link to fill out an application, including your full name, date of birth, address and banking information for electronic payments.

This is an example of what kind of technique?

Phishing!

300

You receive a Google security alert notifying you that your Google account has been accessed from the country of Greece. What do you do?

Use Google’s “sign out of all devices” feature and immediately change your security details. Make sure to also change the security details of everything linked to your Google email.

300

Using a handle on social media will keep you anonymous. (T/F)

Not necessarily! 

  • Your account can be hacked. 

  • Someone with IP tracking tools could locate your information.

  • Someone could match up your handle with known details about you or similar handle on other sites

300

Nowadays, how long does it take a hacker to brute force a 8 character password featuring lowercase and uppercase letters, numbers, and symbols?

According to hive systems, only 5 minutes! So make sure your passwords are complicated!



400

You pass by a flyer at school advertising a party with a QR code on it to RSVP. Name 1 way you can safely verify if it is a scam or not



Possible answers:

  1. Check with the front office at the school to see if the party is real

  2. Type in the link, rather than scanning the QR code

  3. “Preview” the QR code by scanning on camera app

400

Can you name at least three ways function creep has enabled companies to gather your data outside of computers?

Many data gathering methods outside of the online space involves function creep, which is when a function that was originally designed to do something, is now doing another thing. Some answers include:

-Fingerprint data (from phone’s fingerprint locks)
-Voice data (From using smart voice recognition technology)
-Facial data (From facial recognition technology)
-Movement patterns (From google maps, car GPS systems)

400

You’ve been careful, but eventually you got pulled into a rental scam that has cost you a damage deposit and first month’s rent. 

Where are the places you can report this crime and get advice and help?

  1. Report the crime to police right away

  2. If the scam was on a website, report it to the admins

  3. Report to your bank or credit card company

  4. Report to the Canadian Anti-Fraud Center website

  5. Talk to people about it! There’s no shame.

400

You get an upset DM from a friend, saying that they clicked on a link you sent them, and their laptop got hit with a virus. What are some steps you can take?

  • Sign out of whatever program sent it, then change your password right away. 

  • Ask the person to send you a screenshot of the message. Does it match your account?

    • Has your account been duplicated, and your friends told to follow this new bogus account?

      • Report fraud account if so, and ask friends to do so as well.

    • Has your account been hacked, and a link sent to your followers?

      • Send your followers a note saying that you are looking into a possible hack, and not to click on any links sent by your account

  • If this is a case of identity impersonation, also report to police and request a file number.

400

One day walking into work, you notice an envelope addressed to you with a USB drive inside of it. You flip it around and find out that the sender is one of your coworkers. What do you do with the USB drive?

Confirm with the sender that it was indeed them that sent you the USB! 


Remember that everyone plays a role in security no matter what their line of work is! Taking a few minutes to confirm the USB drive is better than having malware being injected directly into whatever system you could have plugged it into!