Programs that attempt to blackmail a user into making a payment to a hacker. Programs that monitor user activities (such as websites visited, usernames and passwords used) and send the information back to a hacker. Trojans cannot spread by themselves - instead they deceive a user into installing the program. They are often disguised as email attachments. Programs which pretend to be legitimate but in reality are malware. Programs similar to viruses except that they are not hidden within other files. Viruses often cause damage by deleting or modifying data. They replicate themselves and become part of other programs. Programs embedded (hidden) within other files. Malware is malicious software that is designed to hack a system. Networks can be hacked using a variety of techniques.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |