Across
- 2. Scary messages claiming your computer is infected and urging you to call a number.
- 5. (MFA) Extra security step (like a code or app) on top of your password.
- 6. phishing done by phone call
- 12. When hackers break into a company’s system and steal customer data.
- 14. Simple or reused passwords are easy to crack.
- 15. When scammers trick you into giving away information or access by pretending to be someone you trust.
- 16. Malware that locks your files and demands money to unlock them.
- 18. Fake emails or texts designed to steal passwords, money, or personal info.
- 19. highly targeted phishing attack aimed at a specific person or company.
Down
- 1. Fake login pages that steal your usernames and passwords.
- 3. Scammers fake the “From” address in emails to look legitimate.
- 4. AI-generated fake videos, voices, or images made to mislead.
- 7. Attackers trick people into buying and sending gift card codes.
- 8. A program that secretly watches what you do on your computer or phone.
- 9. The idea of “never trust, always verify.” Even trusted systems, emails, or people can be compromised.
- 10. Malicious software (viruses, spyware, trojans) that damages devices or steals data.
- 11. Phishing done by text message
- 13. A program that looks safe but hides malware inside.
- 17. Scammers send you packages you didn’t order to make fake reviews look real.
