malware
- Created by: revisemaster451
- Created on: 05-07-18 14:02
Y | B | I | B | I | T | X | S | B | M | B | U | K | D | M | S | W |
C | V | I | O | B | R | T | R | U | C | J | V | B | T | H | X | F |
N | B | R | A | R | B | J | A | I | H | K | V | A | S | T | G | W |
J | Y | C | J | Q | D | A | N | A | X | H | F | E | Y | R | A | W |
M | I | O | O | B | M | A | S | B | K | V | R | O | Q | O | Q | A |
A | X | R | Q | R | L | U | O | K | X | A | X | S | W | J | G | H |
C | X | U | P | T | F | J | M | D | W | N | A | P | E | A | K | B |
O | R | M | P | X | G | B | W | L | T | Y | P | Y | J | N | W | G |
C | B | X | U | S | L | Y | A | W | Q | J | B | W | M | H | W | K |
R | R | W | K | U | G | M | R | T | R | S | R | A | C | O | X | O |
F | N | T | U | F | N | E | E | C | U | M | P | R | J | R | A | J |
W | H | W | O | R | M | E | U | R | B | T | O | E | R | S | L | Y |
A | Q | U | N | E | E | Y | I | F | Q | R | G | K | I | E | N | F |
R | X | L | R | P | K | V | S | P | H | F | K | K | Q | O | R | I |
F | E | D | O | L | A | D | W | A | R | E | W | F | A | L | Q | E |
K | F | C | E | H | J | P | X | L | Q | Q | B | T | K | U | X | D |
G | K | T | W | H | N | U | D | P | D | W | S | U | U | X | P | K |
Clues
- A piece of malware that replicates itself. (4)
- Any software intentionally created to cause damage to a computer (7)
- This malware holds your data hostage (10)
- This malware is a piece of coding that spreads when an infected file is opened. (5)
- This malware looks like a legitmate site or link but steals your personal data (6, 5)
- This malware monitors users actions via key tracking and websites. (7)
- This malware presents itself as an advertisement in order to entice people. (6)
Comments
No comments have yet been made