Keylogger - Monitors user activity such as browsing activity, program use and keystrokes in order to acquire usernames and passwords., Cryptocurrency miner - Uses the computing power of an infected device to generate cryptocurrency(such as Bitcoin) for the attacker., Ransomware - Infects a device, encrypts the files and demands payment to the attacker in order to unlock the files., Spyware - Monitors user activity without their knowledge and sends this data to the attacker., Rootkit - Software tools that allow an attacker high-level access to a device without being detected., Trojan - Malware disguised as genuine software to trick a user into installing/running it, givng the attacker acces to the device., Worm - Able to self-replicate and spread without user action to exploit vulnerabilities in a device´s security measures, Botnet - A malware attack using multiple infected computers that follow the commands of the attacker., Virus - Malware that attaches to genuine files and replicates itself to infect a device. Other devices are also infected if they receive files from an infected device., Adware - Tracks user activity in order to show advertising which can be difficult to close.,
0%
Dangerous software
共用
共用
共用
由
Danijel66
編輯內容
嵌入
更多
排行榜
顯示更多
顯示更少
此排行榜當前是私有的。單擊
共用
使其公開。
資源擁有者已禁用此排行榜。
此排行榜被禁用,因為您的選項與資源擁有者不同。
還原選項
匹配遊戲
是一個開放式範本。它不會為排行榜生成分數。
需要登錄
視覺風格
字體
需要登錄
選項
切換範本
顯示所有
播放活動時將顯示更多格式。
打開結果
複製連結
刪除
恢復自動保存:
?