tRojans 0.0 / 5 ? ComputingDatabasesGCSEAQA Created by: JohnSmith12345678912Created on: 07-11-18 10:13 Backdoor are often used to unite a group of victim computers to form a botnet or zombie network that can be used for criminal purposes. 1 of 10 Exploit are programs that contain data or code that takes advantage of a vulnerability within application software that’s running on your computer. 2 of 10 Rootkit are designed to conceal certain objects or activities in your system 3 of 10 Trojan-Banker are designed to steal your account data for online banking systems 4 of 10 Trojan-Downloader can download and install new versions of malicious programs onto your computer 5 of 10 Trojan-GameThief steals user account information from online gamers. 6 of 10 Trojan-Ransom so that your computer doesn’t run correctly or you can no longer use specific data 7 of 10 Trojan-SMS sending text messages from your mobile device to premium rate phone numbers. 8 of 10 Trojan-Spy can spy on how you’re using your computer 9 of 10 Trojan-Mailfinder These programs can harvest email addresses from your computer. 10 of 10
Comments
No comments have yet been made