The Curious Case of Pretexting: When Tech Support Isn’t Really Tech Support!

12345678910
Across
  1. 2. What attackers exploit to manipulate you in social engineering attacks.
  2. 4. The act of checking or confirming the authenticity of a caller before sharing sensitive information.
  3. 5. The system utility in Windows that allows users to view and adjust system settings.
  4. 7. Department responsible for assisting users with IT issues, often impersonated in pretexting attacks.
  5. 8. The location where Rachel's fake tech support character supposedly worked.
  6. 10. Software designed to detect and destroy malware.
Down
  1. 1. World-renowned security consultant and former hacker who helped popularize social engineering.
  2. 3. Network security system that monitors and controls incoming and outgoing network traffic.
  3. 6. A form of social engineering where the attacker lies to obtain restricted information.
  4. 9. CEO of SocialProof Security and expert in social engineering.