Take Quiz


Not all hackers, scammers, and spammers create social engineering attacks sophisticated enough to trick savvier internet users. However, some still manage to seep through the cracks, such as these popular attacks we reported on earlier in the year.

But there are criminals with the skills, means, and willingness to devise cons that are virtually indistinguishable from legitimate communications and content — and these are the criminals who can do the most damage.

phishing scam

Phishing scams have evolved and expanded exponentially over the past decade, and it’s no coincidence that this growth has followed the rise of the smartphone. Today, users and businesses are more likely to both receive and fall victim to a phishing scam over a mobile device than they are over a traditional desktop or laptop computer. There are several reasons for this, which we’ll get into throughout the quiz.

Before you start, bear in mind that however easy or hard this quiz is for you, you are going through it with the awareness that you are taking a quiz, so you’re probably approaching each scenario with a heightened degree of scrutiny (perhaps in the hopes of beating your coworkers in a little friendly competition).

But out in the open, when it’s not a simulation, what are the odds that you’ll examine every seemingly legitimate or innocuous message, link, attachment, etc., regardless of the platform or source it comes through, with the same degree of scrutiny? And therein lies the real danger.

Take Quiz

Wandera has advanced capabilities for detecting zero-day phishing attempts using MI:RIAM and advanced threat detection engine which has a 98% success rate for proactively seeking out, recognising and blocking phishing attacks before hitting their first ‘patient zero’. MI:RIAM analyzes billions of mobile inputs daily using a wide range of data science techniques. Find out more about our tool here.