The perfect addition to your holiday tradition

This holiday season, let us whet your appetite with an array of cybersecurity games. We may just have hidden some exciting prizes for you!

Let the games begin!

CyberPuns

If you dig dad jokes, we have some sigh-ber puns for you. We hope they make you laugh...or groan. Flip the card to reveal the answer.

  • Experts urge you not to use fortnight as your password. Why?
    It’s two week.
  • Did you hear about the hacker who escaped the police?
    They ransomware.
  • Why do astronauts prefer Linux as their OS?
    Because they can't open Windows in space.
  • I used to tell a joke about UDP at parties, but I quit.
    I could never tell if anyone got it.
  • Why did the hacker send back their breakfast?
    Because the restaurant didn't salt their hashes.

Game on!

Here are a few games to get you started!

Winners of the lucky draw stand a chance to win gift vouchers!

  • Cyber crossword
  • Minute to win it
  • Peek a word

Holiday e-cards

Here are a few e-cards to show your favorite people that you are
thinking of them this festive season.

© 2022 Zoho Corporation Pvt. Ltd. All rights reserved.

You can enter by proving your identity. Just kidding, your email ID is enough.

  •  
By clicking 'Submit to play the game', you agree to processing of personal data according to the Privacy Policy.

Thank you for your interest!

Your request has been recorded.
Please check your inbox for further details.

Meet you soon!

Register form to send E-card

  •  
  •  
  •  
By clicking 'Send e-card', you agree to processing of personal data according to the Privacy Policy.
EXITView answer

Cyber crossword

5
4
1
3
6
2
Down
  • 1An extra step in hashing where an additional value is added to passwords to change the hash value.
  • 2Digital signatures are susceptible to a ____ attack. (Hint: It's also cake day.)
  • 3A key exchange protocol that helps in achieving forward secrecy.
Across
  • 4The biggest cyberhack in history targeting a state-owned national oil company, Saudi Aramco
  • 5A malware synonymous with WannaCry.
  • 6A standard knowledge base of adversary tactics and techniques based on real-world observations.
EXIT

Cyber crossword Answers

EXIT

Minute to win it

Choose a category below and start the quiz.

EXIT

Tic tac attack

Pick the odd one out.

  • Clue 1: Common on public Wi-Fi networks, which are unsecured and leave your personal data vulnerable
  • Clue 2: Attacker sets up a fake Wi-Fi access point hoping that users will connect to it instead of a legitimate one
  • Clue 3: Infamously known as "The Evil Twin"
  • Correct answer
1/5
Next

Guess the attack.

  • A strain of ransomware that encrypts files and spreads to different systems swiftly
  • Attack launched via email phishing to install TrickBot and BazaarLoader Trojans to gain remote access
  • Uses a link to point the user to a maliciously loaded document, which upon download, downloads a Bazaar backdoor malware server as well
  • Correct answer
2/5
Next

Guess the attack.

  • Common Trojan malware that steals passwords
  • Spreads via email-driven botnet that inserts replies in active email threads
  • Known to target bank customers to spy on financial operations
  • Correct answer
3/5
Next

Guess the attack.

  • Clue 1: Malware infects devices running on Linux ARC processors, turning them into remotely controlled bots
  • Clue 2: Exploits security vulnerabilities in IoT devices to gain network access via default username and password combinations
  • Clue 3: Launches DDoS attack with remotely controlled network of bots
  • Correct answer
4/5
Next

Guess the attack.

  • Clue 1: Malware that primarily spreads through spam emails
  • Clue 2: Ransacks your contact list and sends itself as an email to the entire contact list from the hijacked account to make it seem legitimate
  • Clue 3: Current versions include the ability to install other malware to infected machines.
  • Correct answer
5/5
Submit to view your score
EXIT

The not-to-dos

Which of the following activities should be avoided to combat ransomware?

  • Correct answer
1/5
Next

Of the following practices, select the one you should not do when accessing a network remotely.

  • Correct answer
2/5
Next

What shouldn't you do when you restrict access to resources?

  • Correct answer
3/5
Next

One of these practices can invite insider attack on an organization.

  • Correct answer
4/5
Next

Find the misfit among these robust cybersecurity frameworks.

  • Correct answer
5/5
Submit to view your score
EXIT

Figure IT out

Pick the odd one out.

  • Correct answer
1/5
Next

An example of symmetric key encryption:

  • Correct answer
2/5
Next

Which of the following is an encryption tool built into Windows?

  • Correct answer
3/5
Next

Keylogger is a type of ___.

  • Correct answer
4/5
Next

What was the world's first computer virus?

  • Correct answer
5/5
Submit to view your score

Congrats! You got out of 5.

Tis the season of giving

You win a
10$ gift voucher

We will mail the voucher to you shortly!

You get a

Complimentary license

Log360, our SIEM solution for, 45 days.

Tough luck

Let's give it another shot

Thank you for your interest!

Your request has been recorded.
Please check your inbox for further details.

Meet you soon!

Fill the below form

  •  
  • By clicking 'Submit', you agree to processing of personal data according to the Privacy Policy.
EXIT

Peek-a-word

Here's a holiday-themed word game for you.

How to play?

How to play?

  • 1We have a Holiday-themed word hidden behind these tiles for you.
  • 2Start by guessing with any valid five-letter word.
  • 3A YELLOW tile indicates that you have the right letter in the right position.
  • 4A BROWN tile shows that you have the right letter in the wrong spot.
  • 5A GREY tile denotes that the letter is not part of the word.
  • 6You have six tries. We are rooting for you to solve the puzzles in the fewest tries.

Congrats! You've found all the words.

Try other games
Thank you for your interest. Now you can start playing the game.
We will send the e-card on your behalf to the mentioned mail ID.
Congratulations! We will send your gift to your inbox shortly.