Across
- 3. Updating software for security
- 6. Disguised malware
- 8. Captures typed keystrokes
- 9. Floods server with traffic
- 10. Advertising-supported software
Down
- 1. Targeted email scam
- 2. Faking identity or data
- 4. Network of infected devices
- 5. Dual authentication method
- 7. Unauthorized access point
