This type of malware disguises itself as a legitimate program in order to gain access to a computer system.
TROJAN π
This term refers to a password that is easy to guess, often using common words or phrases.
WEAK PASSWORD(;Β΄ΰΌΰΊΆΩΉΰΌΰΊΆ`)
This virus, which appeared in 2000, was one of the most widespread and destructive viruses of its time. In it appeared a heart felt message.
ILOVEYOU virusβΈ(ο½‘Λ α΅ Λ )βΈβ‘
This security software acts as a barrier between a computer or network and the internet, allowing only authorized traffic to pass through.
FIREWALLπ₯π§±
π¦πππ£ ππ’ π£ππ ππππ ππ π£ππ‘π‘π¨ π. πππ₯ππ’' πππ‘ππ’π£ππππ ππππ‘ππ£πππ π’π¨π’π£ππ?
TEMPLE OS π
This type of malware is designed to spread rapidly through a network, often using files to do so.
WORM π
This term refers to a password that is made up of random letters, numbers, and symbols, making it much more difficult to guess.
STRONG PASSWORDπͺ
This type of cyberattack involves tricking a user into divulging sensitive information, often by posing as a trustworthy entity.
PHISHINGπ π£
This security software is designed to detect and remove malware from a computer or network.
ANTIVIRUS SOFTWARE π§Ό
π¦πππ£ π¦ππ’ π£ππ πππ‘π’π£ πππ’π’πππ π’πππ£ ππ₯ππ‘ π£ππ πππ£ππ‘πππ£
LOGIN
This type of malware encrypts a user's files and demands payment in order to restore access to them.
RANSOMWARE π₯·π°π
Attackers can crack these weak passwords in seconds because theyβre constructed from linguistic patterns found in word lists commonly indexed by automated cracking tools.
BRUTE-FORCING π¦π¨
This type of malware is designed to take control of a computer or network and use it to send spam emails or launch other attacks:
B0T(β Ν‘Β° ΝΚ Ν‘Β°)β
This term refers to a method of authentication that uses a combination of something the user knows (such as a password) and something the user has (such as a fingerprint or other biometric data).
MULTI-FACTOR AUTHENTICATION (MFA) Γ π
π¦πππ‘π π¦ππ’ π£ππ πππ‘π’π£ πππππ€π£ππ‘ ππππ
ANCIENT GREECE
This type of malware is often spread through infected email attachments or links to malicious websites, must be executed.
VIRUSπ€
This tool securely stores, organizes, and generates passwords, helping users manage multiple accounts without reusing weak credentials.
PASSWORD MANAGERπ¨π»βπΌ
This type of cyberattack involves gaining access to a system and then stealing valuable data or information from it.
HACKING(Λ΅ β’Μ α΄ - Λ΅ ) β§
DATA BACKUP π
π¦πππ£ π¦ππ’ π£ππ πππ‘π’π£ ππ‘ππ¦π’ππ‘ πππ₯πππ£ππ
NETSCAPE
This type of malware is specifically designed to capture login credentials and other sensitive information from a user's computer.
Keylogger β¨οΈ
What is used to encrypt WiFi passwords
WPA/WPA2 πΆπ
This type of cyberattack involves using a user's own computing resources to mine cryptocurrency without their knowledge or consent.
CRYPTOJACKING (ΰΉ`^Β΄ΰΉ)οΈ»γβδΈ (;Β΄ΰΌΰΊΆΩΉΰΌΰΊΆ`)
SECURITY TOKENπͺ
π¦πππ ππ’ ππ’. ππππππ€ππ'π’ πππ‘π£ππππ¨
6TH SEPTEMBER