General Questions
Types of Viruses
More about Viruses
Case Studies
Misconceptions
111

This type of software is designed to do harm

Malware

111

This software secretly monitors and collects personal information about users and sends it elsewhere

Spyware

111

This is the most common origin of spyware

Downloads

111

This company suffered a leakage in data through this Bluetooth orientated malware 

Cloudflare

111

Will you know if your computer is infected?

you won't most of the time

223

This is a leading cyber security company

McAfee

223

This type of spyware can pop ads or collect information about the user's web-surfing and consumer habits

Adware

223

what year was the first virus created?

1970's

223

This man is a member of Google's Project Zero and helped to identify the vulnerability in Cloudflare

Tavis Ormandy
223

Clicking a link can infect your device?

it can

367

This is a result of installation or injection by a remote attacker

Installation of a virus

367

This type of software is malicious, provides little or no benefit, and is sold using scare tactics

Scareware

367

What % of computers are infected with spyware? 

80%

367

This elite hacking group has leaked information about many large organizations, including the NSA

Shadow Brokers

367

Does antivirus catch everything?

no it does not catch everything

495

This company had one of the largest-ever security breaches in US history as a result of malware

Heartland Payment Systems

495

This malware locks you out of all your programs and data, and demands payment before allowing access 

Ransomware

495

What is the most common form of payment requested through ransomware malware? 

Bitcoin
495

There have been data leakages implicating the NSA in infiltrating what geographic region's financial systems

Middle East

495

Are macs immune to viruses?

no they are not

583

Heartland Payment Systems had to spend this amount in legal costs and fines as a result of their data breach

~$12.6 million

583

This malware is a type of trojan horse that lies idle until triggered by an event

Time bombs or Logic bombs

583
This type of malware writes hidden messages

Steganography

583

This type of ransomware hit Ukrainian infrastructure and other large corporations networks, including Rosnoft 

Petya

583

Is bonzi buddy still spyware?

not completely but still spyware

M
e
n
u