Yay!
You did it
uh-huh,
you ran out of time!
Thank you for participating!
Thank you for participating!
Share the game now. Challenge your friends and dominate the leaderboard together!
The winners will be revealed in next month's IAM & IT Security Newsletter edition.
Stay tuned!
Cyber Threats Revealed: Know the threats
A software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
A fraudulent practice of sending e-messages in order to induce individuals to reveal confidential information, such as passwords.
An act of disguising a communication or identity so that it appears to be associated with a trusted, authorized source.
A malicious software program designed to grant unwanted access for a remote attack.
A malicious software designed to block access to a computer system until a sum of money is paid.
A cybersecurity threat where an attacker attempts to gain unauthorized access to a system or network by cracking a user’s password.
A cyber attack that targets the vulnerabilities of smart devices and applications connected to the internet, allowing attackers to gain unauthorized access, steal data or cause damage to the devices.
A cyber attack that involves the unauthorized use of people's devices (computers, smartphones, tablets, or even servers) by cybercriminals to mine for cryptocurrency.
A cyber attack where malicious software is automatically downloaded to a user's device without their consent when they visit a malicious website.
A cyber attack meant to shut down a machine or network, making it inaccessible to its intended users.
2024 Zoho Corporation Pvt. Ltd. All rights reserved.