This site can be used to determine if your email may have been involved in a breach
Phishing emails frequently come from addresses that look similar to real ones but have small differences. This part of the email should be checked closely.
What is the sender’s email address?
This is the name of the settings that determine who can see your information on social media platforms.
What are Privacy settings?
This term describes the use of psychological manipulation to trick people into giving away confidential information.
What is social engineering?
This term describes a collection of related web pages that are accessed through a common domain name or URL.
What is a website?
This is used to manage a user’s passwords across various accounts.
What is a password manager?
Phishing emails often have this type of message, urging the recipient to act quickly to prevent something bad from happening
What is an urgent message?
This is the act of publicly providing personally identifiable information about an individual or organization, usually via the Internet and without their consent.
What is Doxxing?
This social engineering technique involves making up stories to get you to share personal information.
What is Baiting?
This type of firewall specifically protects web applications by filtering and monitoring web traffic.
What is a Web Application Firewall?
This number is a good starting point for password length.
What is 16 characters?
Clicking on a link in a phishing email might take you to one of these fake sites designed to look real to steal user's passwords.
What is a credential harvesting page?
This type of platform, where users can post, share, and comment on content, can be a source of cybersecurity threats such as identity theft, cyberstalking, and data leakage if not used with caution.
What is Social Media?
Social engineers often pretend to be someone they’re not to gain trust. This technique is known as this.
What is pretexting?
This is the standard language used to create and design web pages.
What is HTML?
Passwords are commonly leaked through this
What are breaches?
Before clicking a link in an email, you should do this to see where the link actually goes.
What is hover over the link?
This term refers to data that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. It’s crucial to protect this to maintain online privacy.
What is Personal Information?
In this type of social engineering attack, an attacker promises a service or benefit in exchange for information or access.
What is quid pro quo?
This term describes the malicious practice of adding harmful code into a website to exploit it.
What is injecting bad code?
Passwords are recommended to have this following quality per service.
What is unique?
This type of software might be installed on your computer if you open an attachment from a phishing email.
What is malware?
This term refers to the trail of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services.
What is your Online Footprint
When a social engineer physically follows someone into a restricted area by pretending to be authorized, this tactic is called this.
What is tailgating?
Finding and fixing these weaknesses in websites can prevent hackers from exploiting them.
What are vulnerabilities?