Across
- 2. Grants unauthorized access and allows attackers to control your system.
- 6. Spreads independently through networks, exploiting vulnerabilities.
- 8. Encrypts your files and demands a ransom payment to decrypt them.
- 9. Secretly monitors your activities and gathers information without your knowledge.
Down
- 1. Exploits legitimate programs and system resources to run malicious code, making it harder to detect.
- 3. Disguises itself as legitimate software to gain access to your system.
- 4. Displays unwanted advertisements and gathers data about your browsing habits.
- 5. Self-replicating code that attaches itself to other programs.
- 7. Creates a hidden entry point for attackers to access your system remotely.
