1 | 4 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
1. A technique used by cybercriminals to trick individuals into revealing sensitive information by posing as a trustworthy entity.
2. Malware that records keystrokes on a computer without the user's knowledge, often used to steal login credentials or sensitive information.
3. Malware that encrypts a victim's files or locks their computer, demanding a ransom for their release.
4. Malware that secretly gathers information about a person or organization without their consent.