Across
- 2. Injection Attack that inserts malicious SQL queries into input fields to manipulate databases
- 4. Phishing attack conducted via SMS messages to deceive users into clicking malicious links
- 6. Targeted phishing attack aimed at a specific individual or organization using personalized information
- 7. Site Scripting Injection of malicious scripts into trusted websites viewed by other users
- 8. Injection Attack that executes unauthorized system commands via vulnerable applications
- 10. Phishing attack specifically targeting high-profile individuals such as executives or CEOs
- 13. Malware that encrypts data and demands payment for its release
Down
- 1. Malware disguised as legitimate software to trick users into installing it
- 2. Malicious software that secretly monitors and collects user information
- 3. Voice-based phishing attack where attackers use phone calls to steal sensitive information
- 5. Fraudulent attempt to trick users into revealing sensitive information like passwords or credit card details through fake emails or websites
- 9. Software designed to disrupt, damage, or gain unauthorized access to systems
- 11. Software that automatically displays unwanted advertisements, often tracking user behavior
- 12. Self-replicating malware that spreads across networks without user interaction
