Across
- 2. Use two-factor authentication
- 4. Trick people by canceling it
- 8. Scare, get person to act
- 10. Looks similar to actual site
- 14. Tracks typing
- 15. intrudes on device remotely
- 17. Directly targets
- 19. Protects with physical key
- 20. Password manager
Down
- 1. Trusted person betrays trust
- 3. Are unaware device was infiltrated
- 5. Protects your device using app
- 6. origins with Phreaking
- 7. Lengthy enough, complex
- 9. Talking to a person for info
- 11. Facial recognition, fingeprints, hand, etc
- 12. Leaves their device unprotected
- 13. Must be used during login
- 16. Ethical, useful hackers by testing
- 18. Person hijacking your SIM card
