Malwarebytes

1234567891011121314151617181920
Across
  1. 1. malware attached to another program (such as a document) which can replicate and spread after an initial execution on a target system where human interaction is required.
  2. 4. a network attack wherein threat actors force numerous systems (usually infected with malware) to send requests to a specific web server to crash, distract, or disrupt it enough that users are unable to connect to it.
  3. 6. programs that may include advertising, toolbars, and pop-ups that are unrelated to the software you downloaded.
  4. 8. What's the acronym for a program that creates a secure connection to the internet by encrypting all your online traffic and routing it through a point-to-point connection.
  5. 9. A group of computers that are under the control of a common operator and administered as one unit.
  6. 12. which company gives you cybersecurity for every one
  7. 16. A form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom to get them back.
  8. 18. Firmware is software that is written to a hardware device's memory. It is used to run user programs on said devices.
  9. 19. a private network with restricted access.
  10. 20. a company that provides users with internet services.
Down
  1. 2. A type of malware that gathers information on a device and sends it to a third-party actor or organization that wouldn't normally have access.
  2. 3. the use of online advertising to distribute malware with little to no user interaction required.
  3. 5. Undesired communication, often an email or call, that gets sent out in bulk.
  4. 7. scams that attempt to obtain your information by presenting themselves as legitimate websites, then asking for your password, credit card details, or other sensitive information.
  5. 10. malicious software
  6. 11. A software program that allows users to control another system as if they have physical access to it.
  7. 13. programs that claim to perform one function but actually do another, typically malicious.
  8. 14. a term we use to generally describe a fake or false warning.
  9. 15. A 2-dimensional barcode. They are squares filled with black and white blocks invented to keep track of cars during manufacturing.
  10. 17. the process of changing data in a way that can not (easily) be undone (or decrypted) by parties that don't have a certain key.