Computer Literacy Unlocked โ Chapter 10: Cybersecurity
You will be shown 12 emails. Some are legitimate. Some are phishing attempts designed to steal your information. Your job: read each email carefully and decide โ is it LEGIT or PHISH?
Look for red flags: urgency, suspicious links, generic greetings, misspelled URLs, and requests for personal information.