Malware Types & Descriptions

123456789
Across
  1. 2. Grants unauthorized access and allows attackers to control your system.
  2. 6. Spreads independently through networks, exploiting vulnerabilities.
  3. 8. Encrypts your files and demands a ransom payment to decrypt them.
  4. 9. Secretly monitors your activities and gathers information without your knowledge.
Down
  1. 1. Exploits legitimate programs and system resources to run malicious code, making it harder to detect.
  2. 3. Disguises itself as legitimate software to gain access to your system.
  3. 4. Displays unwanted advertisements and gathers data about your browsing habits.
  4. 5. Self-replicating code that attaches itself to other programs.
  5. 7. Creates a hidden entry point for attackers to access your system remotely.