Across
- 2. A user’s keyboard inputs are secretly being recorded and sent to a hacker.
- 4. A security scan shows repeated failed login attempts using different passwords until one works.
- 10. A user downloads a file that causes all their documents to become locked, with a ransom message demanding payment.
- 12. A worker finds a USB stick in the car park and plugs it into their computer, which later becomes infected.
- 14. An employee installs free software that secretly shows ads and collects browsing data.
- 15. An attacker enters extra commands into a website search box and gains access to customer data.
- 16. Attackers infect a popular industry blog so that anyone who visits it unknowingly downloads malware.
Down
- 1. Unknown software connects remotely to a hacker’s computer, giving them full access to the system.
- 3. Company computers suddenly slow down and begin sending out large amounts of network traffic automatically.
- 5. Hackers post fake DNS entries so users visiting a real website are redirected to a copycat site.
- 6. A senior manager receives a personalised email pretending to be from the CEO, asking them to transfer money urgently.
- 7. Users report that the company website shows pop-up messages containing strange code like <script>alert('Hacked!')</script>.
- 8. An employee gets a text message with a link to “update payroll details.”
- 9. A program runs too much data in memory, causing it to crash and allowing code execution by an attacker.
- 11. A user receives an email that looks like it’s from IT support asking them to “confirm their password.”
- 13. A staff member answers a call from “tech support” asking for their login details to fix an issue.
