Grant received an email informing him that he had won a free smartphone in a contest he did not enter. The email asked for his personal information to claim the prize. What safety measure should Grant take to protect himself from potential scams?

Delete the email and report it as a potential phishing attempt.

Forward the email to friends to share the good news.

Reply to the email with his personal information for verification purposes.

Click the link and provide the requested personal information.

9 answers

Grant should delete the email and report it as a potential phishing attempt.
Jackson received an email that appeared to be from his bank, informing him that there was an issue with his account and requesting him to click on a link to verify his information. Trusting the email's authenticity, Jackson clicked the link and entered his login credentials, unknowingly providing them to a cybercriminal. This situation is an example of:

Sending malicious software through email attachments

Catfishing.

Intercepting and decrypting secure communication channels.

Phishing
This situation is an example of phishing.
Agnes, a photographer, captures a stunning photograph of a sunset and shares it on her public Instagram account. What can Agnes expect in terms of copyright protection for her photograph?

Copyright protection does not apply to publicly available social media posts, she should make her account private if she wants to apply for copyright.

She needs to watermark the photograph to obtain copyright protection.

She needs to include a caption as part of her Instagram post to make it explicit that she has copyright.

Copyright protection is automatic and applies as soon as she takes the photograph.
Copyright protection is automatic and applies as soon as Agnes takes the photograph.
Ntombi received an email claiming to be from a well-known online retailer, stating that her account had been compromised. The email urged her to click on a link and enter her credit card details to resolve the issue. Sensing something suspicious, Ntombi contacted the retailer's customer support directly instead of clicking the link. She discovered that the email was a phishing attempt aimed at obtaining her financial information. In this case, the primary goal of the phishing attack was to:

Gain unauthorised access to a system or network.

Trick users into disclosing sensitive information.

Spread viruses and malware.

Disrupt online services and websites.
The primary goal of the phishing attack was to trick users into disclosing sensitive information.
Marvin regularly posts about his daily routines, including his gym schedule, work hours, and favorite hangout spots. What is the potential risk of Marvin posting this information on social media?

Physical risk to his safety

Loss of control over his social media accounts.

Exposure to online scams and phishing attempts.

Damage to his personal and professional reputation.
The potential risk of Marvin posting this information on social media is damage to his personal and professional reputation.