Across
- 2. collects user activity data without their knowledge
- 5. disables victim's access to data until ransom is paid
- 6. gives hackers remote control of a victim's device
- 7. spreads through a network by replicating itself
- 10. Malware makes changes to files that are native to the OS
Down
- 1. monitors users' keystrokes
- 3. serves unwanted advertisements
- 4. disguises itself as desirable code
- 8. Malware infects mobile devices
- 9. launches a broad flood of attacks
