Across
- 1. a relatively new cyberattack technique that injects malicious code within digital ads
- 4. a malware type in which security mechanism is bypassed to access a system
- 7. a type of malware which replicates from one computer to another
- 8. refer to the weak point in software code which can be exploited by a threat actor. They are most commonly found in an application like SaaS (Software as a service) software.
- 9. the person who explores methods for breaching defenses and exploiting weaknesses in a computer system or network
Down
- 2. a type of malware from cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid
- 3. a cybercrime that happens when someone impersonates a trusted contact or brand, pretending to be someone you trust in order to access sensitive personal information
- 5. refers to any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems
- 6. an attack that attempts to steal your money, or your identity, by getting you to reveal personal information on websites that pretend to be legitimate