Often masquerading as legitimate software, this tricky malware lures users with something they want, such as a cracked game or fake update, before unleashing its payload.
What is a Trojan horse?
This phishing technique uses voice calls to trick victims into revealing sensitive information or credentials, often impersonating IT support or a bank.
What is vishing?
As of recent studies, women make up roughly this percentage of the global cybersecurity workforce.
What is about 25%?
These wearable devices count your steps, monitor your heart rate, and sometimes expose personal health data if not properly secured.
What are fitness trackers (or smartwatches)?
According to superstition, carving this fruit into a lantern was originally done to ward off evil spirits.
What is a pumpkin?
This network attack abuses the protocol that translates IP addresses to MAC addresses, allowing an attacker to intercept or manipulate traffic between devices on a LAN.
What is ARP spoofing?
This targeted phishing attack uses personal information from social media or public sources to craft convincing messages aimed at a specific individual or small group.
What is spear phishing?
In the 1800s, this woman wrote what’s often considered the first computer algorithm for Charles Babbage’s Analytical Engine, earning her the title “the first programmer.”
Who is Ada Lovelace?
This class of IoT device automates home temperature control and can be hijacked if its firmware isn’t updated, letting hackers take command of your comfort from afar.
What is a smart thermostat?
This 1984 film features a suburban teen being stalked by a killer who attacks in his victims’ dreams, wearing a glove with razor-sharp fingers.
What is A Nightmare on Elm Street?
This sneaky form of attack abuses trust in public networks, tricking a device into connecting to a malicious hotspot to steal sensitive data.
What is a rogue access point attack?
Most impersonated brand used in phishing attacks throughout Q4 of 2020 (Google, LinkedIn, or Microsoft).
What is Microsoft?
A U.S. Navy rear admiral who developed one of the first compilers and helped popularize the term “debugging.”
Who is Grace Hopper?
A common flaw in IoT devices is using this type of authentication, often leaving devices accessible with default values like “admin/admin.”
What is weak or default credentials?
This actress, famous for playing Lydia Deetz, the goth teenager who communicates with ghosts, starred in the 1988 cult classic Beetlejuice.
Who is Winona Ryder?
This class of attack targets memory management vulnerabilities, often leveraging use-after-free or buffer overflows to execute arbitrary code, sometimes chaining multiple exploits in a single payload.
What is remote code execution (RCE)?
What common phishing tactic involves creating fake landing pages designed to look almost identical to legitimate login portals for services like Google or PayPal, where users unknowingly submit their credentials to attackers?
What is credential harvesting?
Born in Austria to a Jewish family and known as a Hollywood actress, she co-invented frequency-hopping spread spectrum to prevent radio interception, paving the way for Wi-Fi and Bluetooth.
Who is Hedy Lamarr?
Many IoT devices run this type of lightweight operating system designed for constrained hardware, but improper configuration can expose them to remote exploits.
What is an RTOS (Real-Time Operating System)?
In Irish folklore, this spirit is said to wail outside a house to foretell the death of someone inside.
What is a banshee?
Exploiting a misconfiguration or flaw in a web server, this attack can allow attackers to read arbitrary files, execute commands, or pivot within a network.
What is a server-side request forgery (SSRF)?
Malicious actors searching for websites a company's employees visit often, then infecting the IP address with malicious code or downloads.
What is watering hole phishing?
Known as the “Mother of the Internet,” she created the Spanning Tree Protocol, a crucial networking standard that keeps data flowing without loops.
Who is Radia Perlman?
In the realm of industrial IoT, these systems control machinery and infrastructure like power plants and pipelines, and have been prime targets for cyberattacks such as Stuxnet.
What are SCADA systems (or Industrial Control Systems)?
This 19th-century poem tells the story of a visitor haunted by a talking raven, repeating one word throughout the night.
What is The Raven by Edgar Allan Poe?