computing

12345678
Across
  1. 3. how to access your phone
  2. 4. Is named after a Greek Myth
  3. 7. unknown publicly
  4. 8. a malicious form of self-replicating software
Down
  1. 1. takes your personal information
  2. 2. Exploits hardware and software vulnerabilities to get onto a device
  3. 5. means entry
  4. 6. give testimony in a court of law