Answers
Payments are often demanded in cryptocurrency for anonymity
Operates covertly in the background, often undetected by the user
Similar to viruses, but can self-replicate without human interaction
Spreads rapidly, often exploiting network vulnerabilities
Disguises itself as legitimate software to trick users into downloading and executing it
Encrypts files on a computer or network, demanding payment for access to locked files
Often used to gain unauthorized access to systems
Malware that attaches itself to other files and spreads when these files are copied or activated
Requires human interaction to spread, such as through email attachments or file transfers
Secretly records keystrokes to capture sensitive information like passwords