|
|
3
|
A horse you don't want
|
6
|
Trick click
|
7
|
Valuable even when it's at rest
|
8
|
WannaCry?
|
9
|
DoS from many sources
|
11
|
Wall, no bricks
|
12
|
_____ phishing
|
13
|
Your keystrokes memorialized
|
15
|
How much trust?
|
18
|
A pot you hope attracts interest
|
19
|
Our kind doesn't rain
|
20
|
You hire this color team to attack you
|
21
|
The puzzle sponsor shields you from it
|
22
|
The Morris ____
|
|
|
|
|
1
|
Wherever you are, this is your address
|
2
|
Identity, falsified
|
4
|
A hat that isn't #FFFFFF
|
5
|
A weakness that allows a threat
|
10
|
My words on your video
|
14
|
Happens when a buffer has too much
|
16
|
Bots, coordinating
|
17
|
Engineering not taught in school
|
|
|