CyberSecurity Crossword
Across
- 1. We have to ____ over a hyperlink that's displayed in the email message
- 5. Malware attack that capture all keyboard inputs
Down
- 2. Malware received from emails typically encrypts files and documents on the target machines
- 3. What do you call an email that looks legitimate but is actually a scam?
- 4. Attackers perform ____ to clone our faces, creating videos and pictures that mimic our identity