Across
- 2. They travel around computer networks, looking for unprotected computers. Similar to a virus, it may corrupt or delete data.
- 3. pretending to be a genuine organisation to get someone's details.
- 5. a virus that usually come embedded within another file that looks genuine.
Down
- 1. horse malware that is disguised as a genuine file that gives hackers access to a computer.
- 4. engineering the art of tricking or manipulation to get someone to reveal their personal info.
