Cyber Cross Word (Phishing)
Across
- 2. One way to tell if an email is a Phishing attempt is use of ______ or threatening language.
- 5. If you suspect a Phishing attempt, you can ______ it.
- 8. To report a Phishing attempt, email ______________ or use the "report spam" button.
- 11. A form of Phishing that uses texting platforms.
- 12. When a cybercriminal gets information from various sources to make a phishing attempt for one specific person, this is called _____________.
- 13. Cybercriminals may get your information from ________ available sources.
- 15. Phishing attempts can be spotted via bad grammar, awkward phrasing or other ______ written content.
Down
- 1. Once have reported and blocked the sender, what should you do with the email?
- 3. Phishing attempts via direct message on social media or a phone call is called _______.
- 4. Occurs when criminals try to get you to open harmful links, emails or attachments.
- 6. This form of contact is the usual form of Phishing.
- 7. Communications trying to trick you commonly look like they are from someone _______.
- 9. In some cases, a Phishing attempt can be ________ to your information.
- 10. To handle Phishing attempts properly, its best to think before you _____.
- 14. After reporting, you should _____ the sender.