Identify Cyber Threats
Hey friend! Missing you and looking to hang out soon. Are you free any days next week?
A message from a friend is unlikely to be a cyber threat. Just make sure you know who it is coming from
Click the link below to download your FREE game from WeSellCoolGames.Com. abc123.xx
That certainly looks suspicious!
Malware (malicious software) often breaches networks through suspicious links or application downloads. Always make sure the link and the sender are legitimate before clicking on anything.
Your device's security is out of date! Click the link below to download our latest antivirus software. protectmycomputernow.avx Sincerely, M!CR0SCFT
That doesn't look like a Microsoft product!
Trojan Horses are a type of malware that looks useful in order to trick a user into downloading it. Always look for clues that a file or app may not be safe such as misspellings or fake file types.
We have identified risks with your checking account. Send us your routing number now to protect from fraud.
Why should I give you my routing number?
Phishing - the sending of malicious communications that look legitimate - is one of the most common cyber attacks because it is cheap and easy for cyber criminals to launch and can have high rewards. If in doubt, report it!
Message about your Poshmark order Your package is out for delivery. Thank you for ordering from my shop!
As long as this was regarding an order you actually placed, this message is perfectly safe.
Check out our lowest prices of the season! Right now, you can save up to 40% on new styles for the whole family. Sale ends November 1st.
No harm in advertisements about great sales as long as they aren't trying to make you click suspicious links
This is Bob Jones, your personal advisor at University Finance. We have noticed unusual activity with your account. Please respond to this email with your account number at your earliest convenience.
Have I ever met a Bob Jones at University Finance?
Social Engineering psychologically manipulates the victim into giving personal information, often by pretending to be someone important. Always check with your friends and colleagues if you receive a message from them that looks fake.
Your device may be at risk. Immediate verification required! Use this link to contact your IT helpdesk.
Probably shouldn't trust it even if I do want to keep my device safe.
Scareware is designed to trick victims into purchasing or downloading potentially dangerous software, often saying there are problems with your computer that the software will fix. Only download software from trustworthy sources.
Let's Review
Malware
Phishing
malicious software designed to damage, disrupt, or gain unauthorized access to a computer system
scammers trick people into revealing personal or financial information by pretending to be a trustworthy source.
Trojan Horse
Scareware
deceptive software that tricks users into believing their computer is infected and urges them to buy fake security programs
type of malware disguised as legitimate software that, once installed, gives attackers access to the system
Social Engineering
manipulation of people into revealing confidential information or performing actions that compromise security
Conclusions
Tips for staying safe online
- Only download from trusted sources
- Report anything that looks suspicious
- If in doubt, don't click (and make sure to report and delete)
- Verify who is sending the information
- Don't let scare tactics fool you
- Look for hints that a link is fake such as misspellings or fake file types
Remember, human error is the leading cause of cyber attacks. Do your part to keep yourself and your friends safe.
THANKS FOR PLAYING!
Identify Cyber Threats
Beth
Created on October 8, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Interactive Onboarding Guide
View
Corporate Christmas Presentation
View
Business Results Presentation
View
Meeting Plan Presentation
View
Customer Service Manual
View
Business vision deck
View
Economic Presentation
Explore all templates
Transcript
Identify Cyber Threats
Hey friend! Missing you and looking to hang out soon. Are you free any days next week?
A message from a friend is unlikely to be a cyber threat. Just make sure you know who it is coming from
Click the link below to download your FREE game from WeSellCoolGames.Com. abc123.xx
That certainly looks suspicious!
Malware (malicious software) often breaches networks through suspicious links or application downloads. Always make sure the link and the sender are legitimate before clicking on anything.
Your device's security is out of date! Click the link below to download our latest antivirus software. protectmycomputernow.avx Sincerely, M!CR0SCFT
That doesn't look like a Microsoft product!
Trojan Horses are a type of malware that looks useful in order to trick a user into downloading it. Always look for clues that a file or app may not be safe such as misspellings or fake file types.
We have identified risks with your checking account. Send us your routing number now to protect from fraud.
Why should I give you my routing number?
Phishing - the sending of malicious communications that look legitimate - is one of the most common cyber attacks because it is cheap and easy for cyber criminals to launch and can have high rewards. If in doubt, report it!
Message about your Poshmark order Your package is out for delivery. Thank you for ordering from my shop!
As long as this was regarding an order you actually placed, this message is perfectly safe.
Check out our lowest prices of the season! Right now, you can save up to 40% on new styles for the whole family. Sale ends November 1st.
No harm in advertisements about great sales as long as they aren't trying to make you click suspicious links
This is Bob Jones, your personal advisor at University Finance. We have noticed unusual activity with your account. Please respond to this email with your account number at your earliest convenience.
Have I ever met a Bob Jones at University Finance?
Social Engineering psychologically manipulates the victim into giving personal information, often by pretending to be someone important. Always check with your friends and colleagues if you receive a message from them that looks fake.
Your device may be at risk. Immediate verification required! Use this link to contact your IT helpdesk.
Probably shouldn't trust it even if I do want to keep my device safe.
Scareware is designed to trick victims into purchasing or downloading potentially dangerous software, often saying there are problems with your computer that the software will fix. Only download software from trustworthy sources.
Let's Review
Malware
Phishing
malicious software designed to damage, disrupt, or gain unauthorized access to a computer system
scammers trick people into revealing personal or financial information by pretending to be a trustworthy source.
Trojan Horse
Scareware
deceptive software that tricks users into believing their computer is infected and urges them to buy fake security programs
type of malware disguised as legitimate software that, once installed, gives attackers access to the system
Social Engineering
manipulation of people into revealing confidential information or performing actions that compromise security
Conclusions
Tips for staying safe online
Remember, human error is the leading cause of cyber attacks. Do your part to keep yourself and your friends safe.
THANKS FOR PLAYING!