10 real-world scenarios. Phishing emails, password myths, social engineering, deepfakes, and more. Get your score and a personalized action plan — no jargon, no lecture.
Who's taking the quiz?
Identify fake sender domains, urgency manipulation, and spoofed URLs — the #1 attack vector for families.
Understand what makes passwords strong (hint: length, not complexity) and why reuse is catastrophic.
Recognize manipulation tactics — fabricated emergencies, trust exploitation, and identity impersonation.
Default passwords, public network risks, and what permissions a flashlight app actually needs.
Spot AI-generated video and voice impersonation before they compromise your decisions.
Digital breadcrumbs, app permissions, and the combination of data points that creates a targeting profile.
Calculating your Cyber IQ…