____ is a form of fraudulent activity. More often than not, official-looking ____ are sent impersonating a well-known provider, such as a bank. These emails are sent to acquire people’s passwords and credit card details. ____ often present themselves as harmless computer programmes so that ____ can penetrate your computer without being detected. ____ very often appears in the corner of a website you are browsing and can look like a genuine advert. It is best to avoid clicking on these as they can save information and contain ____.

Computer risks and threats

Leaderboard

Visual style

Options

Switch template

Continue editing: ?