AB1401 puzzle

123456
Across
  1. 1. The use of deception to manipulate individuals into revealing confidential information.
  2. 3. Who are the most vulnerable to be manipulated by hackers?
  3. 4. What security feature did the hacker exploit in the sim swap hack?
  4. 5. What is the most commonly reported security attack?
  5. 6. Which company experienced the biggest cyber attack in Singapore?
Down
  1. 2. How can we guard against social engineering tactics?