a malicious program that replicate itself by copying itself to another program, VIRUS, TROJAN HORSE, WORM, SPYWARE, KEYLOGGER, BOTNET, a malicious program that disguised as legitimate program that user will accept and use but take control of your computer, VIRUS, TROJAN HORSE, WORM, SPYWARE, KEYLOGGER, BOTNET, malicious program that copy’s itself and spreads to other computers, VIRUS, TROJAN HORSE, WORM, SPYWARE, KEYLOGGER, BOTNET, malicious program that copy’s itself and spreads to other computers, VIRUS, TROJAN HORSE, WORM, SPYWARE, KEYLOGGER, BOTNET, An unwanted advertisement that will pop-up several times on victim's computer then behaves abnormally and tedious to close them., VIRUS, TROJAN HORSE, ADWARE, SPYWARE, KEYLOGGER, BOTNET, A program that runs in the bakground and steals user credential information and send back to hack by recording every keystroke that a user makes on their computer or device., VIRUS, TROJAN HORSE, ADWARE, SPYWARE, KEYLOGGER, BOTNET, A collection of infected internet-connected devices such as PC and mobile phone that are controlled by a common type of malware., RANSOMWARE, ROOTKIT, ADWARE, SPYWARE, KEYLOGGER, BOTNET, A software tools used by hackers to gain control over a computer on a network without being exposed., RANSOMWARE, ROOTKIT, ADWARE, SPYWARE, KEYLOGGER, BOTNET, A ransom virus that block the user from accessing the programs or files and demands to pay the ransom through online method for the removal of the virus., RANSOMWARE, ROOTKIT, ADWARE, SPYWARE, KEYLOGGER, BOTNET, Also know as junk email or unwanted email send by advertiser or bot. It can be used to send malware., Spam, Phishing, Cybercrime, Bullying, also known as malicious software, malware, sypware, adware, ransomware.

Leaderboard

Visual style

Options

Switch template

)
Continue editing: ?