How It Works

Work through 4 levels on your virtual computer. Each level presents a different cybersecurity scenario. Examine each case carefully and decide whether it is safe or a threat — then learn from the explanation.

Malware often disguises itself as something harmless. Look for suspicious file extensions, misspelled domains, unnecessary permissions, and promises that seem too good to be true.
🛡️

Welcome, Cyber Analyst!

Your computer has received suspicious files, emails, and pop-ups. Work through 4 levels to identify threats and protect the system.

💻 Level 1 — File Scanner📧 Level 2 — Email Inbox🌐 Level 3 — Browser Pop-ups🔒 Level 4 — App Permissions

🦠 Malware Types

🦠
Virus — attaches to files and spreads
🪱
Worm — self-replicates across networks
🐴
Trojan — disguised as useful software
🔐
Ransomware — locks files until you pay
👁️
Spyware — secretly monitors activity
📢
Adware — floods you with ads

🛡️ Security Guide

Red flags to watch for

🚩 .exe, .bat, .vbs from unknown sources

🚩 Misspelled or fake sender domains

🚩 Fake virus alerts in your browser

🚩 Apps requesting unneeded permissions

🚩 Prizes, free money, or urgent threats

🚩 Countdown timers creating panic

💡 When in doubt, don't click. Contact IT support or a trusted adult instead.