Answers
Requires human interaction to spread, such as through email attachments or file transfers
Similar to viruses, but can self-replicate without human interaction
Payments are often demanded in cryptocurrency for anonymity
Often used to gain unauthorized access to systems
Secretly records keystrokes to capture sensitive information like passwords
Operates covertly in the background, often undetected by the user
Encrypts files on a computer or network, demanding payment for access to locked files
Spreads rapidly, often exploiting network vulnerabilities
Disguises itself as legitimate software to trick users into downloading and executing it
Malware that attaches itself to other files and spreads when these files are copied or activated