Across
- 5. disguises and intercepts
- 6. Voice over IP attacks
- 8. automating all combinations of possible password
- 10. one who acquires Bitcoin by solving math
Down
- 1. damaging software without user’s consent
- 2. unmonitored logging of pressed keys
- 3. a malware that encrypts file in exchange for ransom
- 4. cellular users attack
- 6. replicates when infects a host computer
- 7. targeted cyber-attack (first word only)
- 9. a standalone malware
- 11. large-scale cyber-impersonation
