Keylogger - Monitors user activity such as browsing activity, program use and keystrokes in order to acquire usernames and passwords., Cryptocurrency miner - Uses the computing power of an infected device to generate cryptocurrency(such as Bitcoin) for the attacker., Ransomware - Infects a device, encrypts the files and demands payment to the attacker in order to unlock the files., Spyware - Monitors user activity without their knowledge and sends this data to the attacker., Rootkit - Software tools that allow an attacker high-level access to a device without being detected., Trojan - Malware disguised as genuine software to trick a user into installing/running it, givng the attacker acces to the device., Worm - Able to self-replicate and spread without user action to exploit vulnerabilities in a device´s security measures, Botnet - A malware attack using multiple infected computers that follow the commands of the attacker., Virus - Malware that attaches to genuine files and replicates itself to infect a device. Other devices are also infected if they receive files from an infected device., Adware - Tracks user activity in order to show advertising which can be difficult to close.,

Leaderboard

Visual style

Options

Switch template

Continue editing: ?