Across
- 2. Any software designed intentionally to cause damage to a computer, server, or network.
- 5. A type of malware that encrypts your files and demands payment for their release.
- 7. Rubber Ducky devices often perform a ______ injection attack in order to run unauthorized commands.
- 8. An attacker sends a fake email pretending to be a trusted entity in a ______ attack.
Down
- 1. A ______ records each key pressed on a keyboard, often to steal passwords.
- 3. A process of converting information into ciphertext to prevent unauthorized access, usually applied in ransomware attacks.
- 4. Short range wireless technology used in wireless earbuds and smartwatches but can be hacked by also used by devices like Flipper Zero.
- 6. Artificial intelligence can create a ______, where someone’s face or voice is replaced or altered to appear realistic.