Across
- 3. Don't act in a ......
- 6. Be ...... of obvious errors
- 7. Using phone calls to deceive victims into providing sensitive information
- 8. Withdrawals from their ...... account
- 9. Computer scam to obtain confidential data like passwords, codes, pins, credit card numbers from the victim
- 12. Don't ...... or open suspicious emails
Down
- 1. ...... can be committed at the expense of the victim
- 2. Similar to spear phishing but aimed at high-profile targets like CEOs or CFOs
- 4. Legit email received
- 5. The scammer's ultimate goal is to extort ...... or even steal the victim's identity
- 10. Check the ...... email address
- 11. Don't trust ...... emails
