Keylogger - Monitors user activity such as browsing activity, program use and keystrokes in order to acquire usernames and passwords., Cryptocurrency miner - Uses the computing power of an infected device to generate cryptocurrency(such as Bitcoin) for the attacker., Ransomware - Infects a device, encrypts the files and demands payment to the attacker in order to unlock the files., Spyware - Monitors user activity without their knowledge and sends this data to the attacker., Rootkit - Software tools that allow an attacker high-level access to a device without being detected., Trojan - Malware disguised as genuine software to trick a user into installing/running it, givng the attacker acces to the device., Worm - Able to self-replicate and spread without user action to exploit vulnerabilities in a device´s security measures, Botnet - A malware attack using multiple infected computers that follow the commands of the attacker., Virus - Malware that attaches to genuine files and replicates itself to infect a device. Other devices are also infected if they receive files from an infected device., Adware - Tracks user activity in order to show advertising which can be difficult to close.,

על ידי

לוח תוצאות מובילות

סגנון חזותי

אפשרויות

החלף תבנית

האם לשחזר את הנתונים שנשמרו באופן אוטומטי: ?