Phishing for Compliments
None Shall Password
Click Here for Malware
The Net
Potent Potables
Socially Engineering
100

An unwarranted sense of urgency, unusual requests, suspicious attachments or links, malformed sender address poor grammar, or a message "too good to be true."

What are indicators or characteristics of a Phishing e-mail?
100

Like the "spice of life!", on the various websites and services you use, you passwords should be this.

What is "different?", or "varied?", or a "variety?"

100

A type of malware that locks you out of your data, demanding payment to restore access.

What is Ransomware?

100

Rivest, Shamir, And Adelman invented the RSA Algorithm, which authenticates this thing at the other end of your browser.

What is a website or webpage?

100

To make a Long Island Iced Teas for a couple characters at the bar, the bartender combines many unrelated alcohols.  To tend to a good long passphrase, combine a couple characters, and several unrelated of "these".

What are "words."

100

Kevin Mitnick popularized the term "Social Engineering" in the context of hacking.  In that context it is lying to trick people into performing an action, and is often combined with creating a sense of this.

What is "urgency?"

200

This type of social engineering and phishing is when a criminal has already hacked into the email of a third party you trust.

What is Business E-mail Compromise?

200

Devolutions, LastPass, Keeper, and Dashlane are all examples of these, ...or it is how Simone Biles may log in to her network.

What is a password manager or password vault?

200

Like the biological threat does to a cell, this malicious software threat thrives off its healthy host, and spreads by attaching itself to a file or program, using its permissions and accounts to do more damage. 

What is a virus?

200

In the movie "The Net", this actor's identity is stolen and their life unravels online. stolen with only a few clicks.

Whos is Sandra Bullock?

200

Containing organic and eco-friendly ingredients, the "Sustainable Spritz" is a 2024 modernization of the Aperol Spritz.   Just like you should constantly do to your tech and computers, its a spritz drink that has been "this."

What is updated?

200

Something often done in parking lots to celebrate before a big sports event, or done by hackers to sneak into a building undetected.

What is "tailgating?"

300

The service used by Conner Strong & Buckelew to deliver training and Phishing tests.

What is KnowBe4?

300

An early use of passwords is the one in the story Ali Baba and the Forty Thieves, when Ali Baba said this phrase.

What is "open sesame?"

300

Odysseus, Helen, and Paris might have recognized this type of malware that disguises itself as legitimate software.

What is a Trojan Horse?

300

These aren't the delicious kind, but accepting them means websites may track you.

What are browser cookies?

300

Daily Double!

What is a virus?

300

In 2008's Operation Buckshot Yankee, the Russian military compromised US DoD using a "worm" and the social engineering attack of dropping these small devices in the parking lot, and someone plugged one in!

What are USB drives?

400

Use the "Report Message," or "Report" button and call the Help Desk.

What should I do if I spot a Phishing E-mail?

400

The product of the technique that combines several unique passwords into a single larger "this."

What is a "passphrase?"

400

This malware actively scans networks and replicates itself on other connected devices without requiring any user interaction, or it eats RFK Jr's brain.

What is a worm?

400

This browser mode lets you think you browse like a ninja in the night, but your ISP still sees you tiptoeing around the internet.

What is 'Incognito Mode?'

400

Very dry beer or wine is called this, a homonym for the term used to "force" one's way through an ID and password "gate" to get into a system.

What is "Brut"?  (brute force)

400

Attackers do this by enticing victims with a tempting offer like a free download, the same word you might use for putting nightcrawlers or squid on a hook.

What is "baiting?"

500

What a Hacker, or Captain Ahab, might call Phishing a VIP, and Executive, or a "Big Target."

What is "Whaling?"  or "Spear Phishing?"

500

When using names in passwords, people are most likely to use the names of this beloved family member.

What is the family pet?

500

A rootkit is a malware that can give remote access to a hacker, and it hides in the lowest layers of one of these, sometimes known as Microsoft Windows, Apple OS, or Ubuntu Linux.

What is an Operating System?

500

First launched in 1994 and originally known as Mosaic, this was the world's first secure web browser.  It no longer exists but was purchased by AOL in 1998 for $4.2 Billion.

What is Netscape Navigator?

500

Often confused with a "Saison", this type of beer refers to a lower-alcohol beer that you can drink over a longer period without getting too intoxicated, or it's a temporary network connection between two devices, like between your browser and a website.

What is a "session."

500

Step one in this attack type comprises a frequently used website by a large group of like minded individuals, named after the destination for thirsty animals on the plains and savannas in the dry season in Africa.

What is a "watering hole?"