Antivirus
Malware
Different types of scams
Phishing
Hackers
100

What are they designed for?

Designed to detect and destroy computer viruses

100

What is malware

A software designed to steal info and damage the computer.

100
What are scams?(fraud)

In law, fraud is intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. Fraud can violate civil law or criminal law, or it may cause no loss of money, property, or legal right but still be an element of another civil or criminal wrong.

100

What is Phishing 

the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers

100

What is a hacker?

A hacker is an individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.

200
Where do you buy antivirus software?

They are usually bought in app stores or on browsers.

200

How do you get malware?

Malware is usually distributed through malicious websites, emails, and software.

200

What is Email Scams?

These are a type of scams that send you fake emails from loved ones, or emails that trick into thinking your getting something for free.
200

What is spear phishing?

Spear phishing targets a specific group or type of individual

200

What are white hat hackers?

A White Hat hacker tests systems and networks by trying to break into them. They are hackers, but their talents are being used to improve Cyber Security.

300

Why should you get an antivirus?

To protect your computer from any dangerous breaches of personal info.

300

How to prevent malware?

An antivirus app is the best way to automatically clean your system of viruses and malware.

300

What are Phone Call Scams

These scams are conducting by people or bots. They call you telling you like your car warranty is over due or that you have taxes that you don't know you had to pay for.

300

What is Smishing?

Smishing is an attack that uses text messaging or short message service (SMS) to execute the attack. A common smishing technique is to deliver a message to a cell phone through SMS that contains a clickable link or a return phone number.

300

What are grey hat hackers?

Gray hat hackers enact a blend of both black hat and white hat activities. Gray hat hackers often look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to fix the problem.

400

How much do they usually cost?

Standard antiviruses cost 30-40 dollars

400

How do hackers use malware

They send emails on which people click on and they accidentally download something leading to their info being taken.

400

Why are scams conducted?

Scams run in corporations. They scam in order to take your identitie or to take all of your money.

400

How to prevent phishing?

Never provide your personal information in response to an unsolicited request, whether it is over the phone or over the Internet. Emails and Internet pages created by phishers may look exactly like the real thing.

400

What are black hat hackers?

Black Hat hackers are criminals who break into computer networks with malicious intent. They may also release malware that destroys files, holds computers hostage, or steals passwords, credit card numbers, and other personal information.

500

Where did antivirus originate from?

The beginnings of antivirus software date back to 1971, when the first computer virus known as the Creeper infected and spread to PDP-10 mainframe computers manufactured by Digital Equipment Corporation (DEC). In order to combat the Creeper, American computer programmer Ray Tomlinson developed the Reaper.

500

What is the origin of malware

Examples of malware attacks date back several decades to the early days of the first personal computers. The first PC-based malware attack, “Brain,” was released in 1986 and infected the original 5.2" floppy disks of IBM Personal Computers.

500

What pre cautions do you take to not get scammed

Don't click on emails that you don't where there from. Don't accept unknown caller calls, and if you d hang up immediately. Don't click on pop up ads.

500

Where did Phishing originate from?

Early phishing techniques can be traced back to the 1990s, when black hat hackers and the warez community used AOL to steal credit card information and commit other online crimes.

500

Why is hacking without permission illegal?

Hacking may lead to criminal charges when a hacker accesses someone else's computer system without consent. For example, a hacker may use a phishing scam to install malware on a computer network. They may also install computer programs, allowing them to commit identity theft or steal confidential information.