Trojan - Disguised as legitimate software these run in the background once a file or software is run or opened., Virus - Malicious code that runs when the file is executed, requires human intervention to run., Worm - A type of virus that is programmed to replicate and spread across networks taking advantage of exploits., Ransomware - Encrypts files, data and more until the victim/target has paid the attacker., Adware - Software which displays and clutters the interface with unwanted advertising sometimes leading to malicious sites., Spyware - Secretly monitors and collects data on user actions while sending the data to the attacker., Denial of Service - Overwhelms a target with traffic to prevent users from accessing it., Brute Force - A hacking method in which password combinations are tried repeatedly to gain access., Phishing - The use of deceptive emails to trick victims into revealing sensitive information, make payments and more., Pharming - The use of fake websites to gather sensitive information such as financial details or login credentials., Spear Phishing - A targeted effort against an individual to get them to leak information., Man in the Middle Attack - Where an attacker intercepts data in transit potentially modifying it or spying on it., Zero Day Exploit - Taking advantage of vulnerabilities which have yet to have been patched., Key Logger - A specific form of spyware which records keyboard inputs to capture sensitive information., Rootkit - Grants the attacker remote access to a device once installed., SQL Injection - Exploits vulnerabilities in applications to delete or manipulate data within databases., Baiting - Tricking victims into installing malware through false promises or rewards., Piggybacking - Using a legitimate users credentials to gain unauthorised access to systems, data and more., Shoulder Surfing - Physically observing someone's use of a device to gather login credentials or sensitive information.,

Leaderboard

Visual style

Options

Switch template

Continue editing: ?