How to play

  • Click Start Game to begin.
  • Click any two cards to reveal their contents and find matching pairs.
  • Continue revealing cards to find and match similar ones within 45 seconds.
  • The player who matches the most pairs in the shortest time tops the leaderboard.
  • Share the game with your colleagues for a chance to win as a lucky sharer.
  • Three players from the leaderboard and two participants who share the game will be selected as the winners.
  45s
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   

Yay!
You did it

uh-huh,
you ran out of time!

uh-huh,
you ran out of time!

Thank you for participating!

Thank you for participating!

Share the game now. Challenge your friends and dominate the leaderboard together!

The winners will be revealed in next month's IAM & IT Security Newsletter edition.
Stay tuned!

Cyber Threats Revealed: Know the threats

  •  
    Malware

    A software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

  •  
    Phishing

    A fraudulent practice of sending e-messages in order to induce individuals to reveal confidential information, such as passwords.

  •  
    Spoofing

    An act of disguising a communication or identity so that it appears to be associated with a trusted, authorized source.

  •  
    Backdoor Trojan

    A malicious software program designed to grant unwanted access for a remote attack.

  •  
    Ransomware

    A malicious software designed to block access to a computer system until a sum of money is paid.

  •  
    Password attacks

    A cybersecurity threat where an attacker attempts to gain unauthorized access to a system or network by cracking a user’s password.

  •  
    Internet of Things attack

    A cyber attack that targets the vulnerabilities of smart devices and applications connected to the internet, allowing attackers to gain unauthorized access, steal data or cause damage to the devices.

  •  
    Cryptojacking

    A cyber attack that involves the unauthorized use of people's devices (computers, smartphones, tablets, or even servers) by cybercriminals to mine for cryptocurrency.

  •  
    Drive-by download

    A cyber attack where malicious software is automatically downloaded to a user's device without their consent when they visit a malicious website.

  •  
    Denial-of-service attack

    A cyber attack meant to shut down a machine or network, making it inaccessible to its intended users.

Register to play now

  • *
     
  • *
     
  •  
  • By clicking 'START GAME' you agree to processing of personal data according to the Privacy Policy.

Leaderboard

Rank Name Points