Across
- 2. Takes advantage of a vulnerability in order to access or infect a computer
- 5. software that permits advertisers or hackers to gather sensitive information without your permission
- 6. a form of malware that replicates across the Internet or local networks
- 10. software that denies you access to your files or computer until you pay a ransom
- 11. a form of trap security specialists use to detect hacking attacks or collect malware samples
- 13. malicious computer programs that can spread to other files
Down
- 1. A collection of infected computers that are remotely controlled by a hacker
- 3. malicious software
- 4. unsolicited bulk email
- 7. Files placed on your computer that allow websites to remember details
- 8. reports of false and unsubstantiated claims, in an attempt to trick or defraud users.
- 9. software add-ons designed to fix software bugs
- 12. deceiving recipients into sharing sensitive
