the apps we should be safe from

12345
Across
  1. 4. deceptive practices to misuse financial institutions and their services for personal gain or to commit other crimes
  2. 5. cybersecurity tactic where attackers send emails with a forged sender address, making it appear as if the email originated from a legitimate source
Down
  1. 1. the act of identifying and exploiting weaknesses in a computer system or network to gain unauthorized access or control
  2. 2. a type of malicious software (malware) designed to replicate and spread between computers, causing damage or disruption.
  3. 3. the use of technology to harass, threaten, embarrass, or target another person.