Across
- 2. Physical device used to spread infected files
- 4. Fake prompt used to trick users into installing Trojans
- 7. Malware disguised as a legitimate application
- 9. Malicious URL that leads to Trojan installation
- 10. Compromised or fake site hosting Trojan files
- 12. Ad-supported software that can deliver Trojans
Down
- 1. Infected file sent via email or messaging
- 3. Posts or DMs luring users to malicious content
- 5. Malicious advertisement spreading malware
- 6. Often triggered by users or scripts to install Trojans
- 8. Deceptive messages that trick users into clicking malicious content
- 11. Used to send malicious links or attachments
