Across
- 2. Stealing data entered into online forms.
- 5. Malware that stays active after reboots.
- 8. Add-on program that extends browser functionality, often abused.
- 10. Technique of hiding malicious code to avoid detection.
- 12. Shared library file targeted in injection attacks.
- 13. Special system rights that attackers try to escalate.
- 15. Stealthy software designed to hide the presence of malware.
Down
- 1. Stealing security tokens to impersonate a legitimate user.
- 3. Malware that secretly monitors and collects user data.
- 4. Malicious program that attaches itself to files and spreads.
- 6. Application used to access the web, targeted by malware.
- 7. Process of gaining higher access rights than intended.
- 9. Attack that intercepts communication between two parties.
- 11. Self-replicating malicious code that spreads across systems.
- 14. Virtual Machine environment bypassed or checked by malware.
