Across
- 4. a piece of malicious software that attacks the preboot environment and or bios of most computers and phones
- 6. a piece of software or overlooked security flaw that allows access to a system that the administrator was unaware of or was unintentional
- 8. a piece of software designed to trigger when specific variables are met
- 10. a cryptomining trojan designed to attack systems with cryptomining software
- 12. a piece of software of encrypts your data and demands money to get it back
- 13. a telegram bot used to attack telegram chats
- 14. malware that contains parts of it's code that serves no purpose at all
- 16. an attack carried out over 24 hours in May 2017 this ransomware infected almost 230,000 windows hosts
Down
- 1. malware that has ability to change itself after being deployed
- 2. software that is designed to collect information about a user and can include popup banners and fake websites
- 3. a malicious piece of software that disguises itself as a reputable piece of software
- 5. software designed specifically to defeat antivirus
- 7. a method in which an attacker writes a piece of malicious software which makes it harder for antivirus and humans to read it
- 9. a piece of software that is designed to gain a root level or kernel level access
- 11. a software designed to masquerades itself as an android system update or a vpn app
- 15. a self replicating software that requires a host to survive
- 16. a self replicating software that does not require a host to survive
