VARIOUS CYBER ATTACKS 16 APR 2026

123456789101112131415
Across
  1. 5. Attack inserting malicious SQL queries.
  2. 7. Malicious software designed to harm systems.
  3. 8. Impersonating a trusted source.
  4. 10. Intercepts communication between two parties.
  5. 12. Fraudulent attempt to obtain sensitive information via email.
  6. 14. Locks data and demands payment to restore access.
Down
  1. 1. Records keystrokes secretly.
  2. 2. Injects malicious scripts into web pages.
  3. 3. Malicious program disguised as legitimate software.
  4. 4. Voice-based phishing attack using phone calls.
  5. 6. Attempts all possible password combinations.
  6. 9. Phishing attack conducted via SMS messages.
  7. 11. Secretly monitors user activity.
  8. 13. Overwhelms a server with traffic.
  9. 15. Self-replicating malware spreading across networks.