Tuesday, March 4, 2025
HomeCyber Security NewsGoogle Launches phishingquiz To Test That you Can Identify Phishing Emails

Google Launches phishingquiz To Test That you Can Identify Phishing Emails

Published on

SIEM as a Service

Follow Us on Google News

Jigsaw, subsidiary of alphabet launched phishingquiz helping user’s to identify what’s fake, the program loads eight questions and asks the user’s to identify it is a phishing or a legitimate one.

A phishing attack is one of the dangerous social engineering attacks that leads to capture a victim’s username and password that will get store it to an attacker machine and reuse it later.

A recent study shows nearly half of the phishing sites using HTTP links and shows the padlock icon which make’s internet user’s beleive that the website is legitimate and safe.

Phishing is one of the most common from of the cyberattack and it is a serious threat that gives attackers access to your account or the financial data.

Phishingquiz

Spear phishing attacks are the first step of the larger cyberattacks, attackers targeted towards a specific individual, organization or business.

“The quiz created based on the security training we’ve held with nearly 10,000 journalists, activists, and political leaders around the world from Ukraine to Syria to Ecuador. We’ve studied the latest techniques attackers use and designed the quiz to teach people how to spot them.”

The best protection against phishing is two-factor, if enabled it stops attackers entering two account even if the attackers gains access to the login credentials and the second best method is to spot the phishing email at earliest.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

ReelPhish – A Real-Time Advanced Two-Factor Authentication Phishing Tool

Half of the Phishing Sites Trick Users by Displaying the HTTPS Green Padlock

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...