Answers
Secretly records keystrokes to capture sensitive information like passwords
Spreads rapidly, often exploiting network vulnerabilities
Often used to gain unauthorized access to systems
Operates covertly in the background, often undetected by the user
Similar to viruses, but can self-replicate without human interaction
Encrypts files on a computer or network, demanding payment for access to locked files
Disguises itself as legitimate software to trick users into downloading and executing it
Malware that attaches itself to other files and spreads when these files are copied or activated
Requires human interaction to spread, such as through email attachments or file transfers
Payments are often demanded in cryptocurrency for anonymity