Across
- 2. Found in the graveyard
- 4. Creepy statues
- 7. Deceptive email pr@ctice
- 10. Cybersecurity measure
- 15. Malicious software
- 16. Network of infected computers
- 17. Mansion staff member
- 20. En7ry k3y
- 22. Mansion's signature tune (3 wds)
- 25. Home of 999 happy haunts
- 27. KN2G64TBM5SSAZTPOIQGCIDIMVQWILBAMFRWG33SMRUW4ZZAORXSA5DIMUQEQYLVNZ2GKZBAJVQW443JN5XA====
- 29. Extra layer of security
- 30. Voiced of several characters in the Haunted Mansion
- 32. Haunted Mansion's musical instrument
- 33. Changing image in Haunted Mansion
- 34. What three ghosts do
- 36. Protection software
- 37. To take advantage of a security flaw
- 38. Mansion decor
- 39. Unauthorized computer user
Down
- 1. Taunt at the Haunted Mansion (2wds)
- 3. 55 6e 77 61 6e 74 65 64 20 65 6d 61 69 6c
- 5. Where portraits lengthen (2 wds)
- 6. Unauthorized access
- 8. 73 110 116 101 114 110 101 116 32 105 100 101 110 116 105 102 105 99 97 116 105 111 110
- 9. Boo!
- 11. U2VhbmNlLWhvbGRpbmcgbWVkaXVtIGF0IEhhdW50ZWQgTWFuc2lvbg==
- 12. Digital offensive
- 13. Mansion's grand
- 14. Mansion finale
- 18. S3lf-r3plicating
- 19. Haunted Mansion newspaper column
- 21. Security weak point
- 23. Malicious software demanding payment
- 24. Mansion ride vehicle
- 26. To fix a flaw
- 28. Authentication via physical traits
- 31. Contacting the dead
- 35. Web tracking item
- 40. Haunted Mansion location with a bride