Créer jeu
Jouer Relier Colonnes

Ransomware

Cryptojacking

Trojan

Adware

Spyware

Phishing

Botnet

Vishing

Smishing

Hoax

Software that secretly gathers information about a user's activities.

Phishing attacks conducted over voice calls.

Attempt to trick people into sharing sensitive information by pretending to be a trustworthy source.

A network of compromised computers controlled by a hacker.

Unwanted software that displays advertisements on a computer.

A harmful software disguised as something useful or legitimate.

Unauthorized use of someone else's computer to mine cryptocurrency.

Malicious software that encrypts files and demands payment for their release.

False information shared to deceive or trick people.

Phishing attacks through SMS or text messages.