Grant received an email informing him that he had won a free smartphone in a contest he did not enter. The email asked for his personal information to claim the prize. What safety measure should Grant take to protect himself from potential scams?

Delete the email and report it as a potential phishing attempt.

Forward the email to friends to share the good news.

Reply to the email with his personal information for verification purposes.

Click the link and provide the requested personal information.

Grant should delete the email and report it as a potential phishing attempt.

Jackson received an email that appeared to be from his bank, informing him that there was an issue with his account and requesting him to click on a link to verify his information. Trusting the email's authenticity, Jackson clicked the link and entered his login credentials, unknowingly providing them to a cybercriminal. This situation is an example of:

Sending malicious software through email attachments

Catfishing.

Intercepting and decrypting secure communication channels.

Phishing

This situation is an example of phishing.

Agnes, a photographer, captures a stunning photograph of a sunset and shares it on her public Instagram account. What can Agnes expect in terms of copyright protection for her photograph?

Copyright protection does not apply to publicly available social media posts, she should make her account private if she wants to apply for copyright.

She needs to watermark the photograph to obtain copyright protection.

She needs to include a caption as part of her Instagram post to make it explicit that she has copyright.

Copyright protection is automatic and applies as soon as she takes the photograph.

Copyright protection is automatic and applies as soon as Agnes takes the photograph.

Ntombi received an email claiming to be from a well-known online retailer, stating that her account had been compromised. The email urged her to click on a link and enter her credit card details to resolve the issue. Sensing something suspicious, Ntombi contacted the retailer's customer support directly instead of clicking the link. She discovered that the email was a phishing attempt aimed at obtaining her financial information. In this case, the primary goal of the phishing attack was to:

Gain unauthorised access to a system or network.

Trick users into disclosing sensitive information.

Spread viruses and malware.

Disrupt online services and websites.

The primary goal of the phishing attack was to trick users into disclosing sensitive information.

Marvin regularly posts about his daily routines, including his gym schedule, work hours, and favorite hangout spots. What is the potential risk of Marvin posting this information on social media?

Physical risk to his safety

Loss of control over his social media accounts.

Exposure to online scams and phishing attempts.

Damage to his personal and professional reputation.

The potential risk of Marvin posting this information on social media is damage to his personal and professional reputation.

The correct safety measure for Grant to take in this situation is to delete the email and report it as a potential phishing attempt.

Phishing is a common scamming technique where attackers try to obtain sensitive information such as passwords, credit card numbers, or personal identification details. They often pretend to be a legitimate organization or individual to trick people into sharing their personal information.

To protect himself from potential scams, Grant should follow these steps:

1. Delete the email: Do not click on any links or download any attachments from the suspicious email. This will minimize the chances of accidentally giving away personal information or infecting the device with malware.

2. Report the email: Most email providers have a built-in feature to report phishing emails. Look for options like "Report Phishing" or "Mark as Phishing" and report the suspicious email. This helps the email provider to identify and take action against such scams.

3. Do not respond or provide personal information: Legitimate organizations will not ask for personal information via email unless you initiated the communication. Grant should never reply to the email or provide any personal information, such as his address, social security number, or financial details.

4. Educate oneself about recognizing scams: It is important to be aware of the common signs of phishing scams, such as suspicious email addresses, poor grammar or spelling errors, urgent or alarming language, or requests for personal information. By staying informed, Grant will be better equipped to identify and avoid potential scams.

Remember, it is always better to err on the side of caution and protect personal information from potential scams.