BASIC COMPUTER CONCEPTS
HISTORY OF COMPUTERS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Phishing
|
|
Pishing
|
|
Phisheng
|
|
Fhishing
|
Detailed explanation-1: -Spyware collects your personal information and passes it on to interested third parties without your knowledge or consent. Spyware is also known for installing Trojan viruses.
Detailed explanation-2: -Spyware is software installed without your knowledge or consent that can monitor your online activities and collect personal information while you’re online. Some kinds of spyware, called keyloggers, record everything you key in-including your passwords and financial information.
Detailed explanation-3: -A phishing email is sent to trick the user. The email is either seeded with a Trojan or has a link for downloading the Trojan or spyware. The Trojan/spyware monitors and reports the user activity and sends login or other confidential data to the malicious user as soon as it detects user access to the target page.
Detailed explanation-4: -Ransomware spreads through phishing emails, malvertising, visiting infected websites or by exploiting vulnerabilities. Ransomware attacks cause downtime, data leaks, intellectual property theft and data breaches.
Detailed explanation-5: -… Phishing isn’t actually software, it’s a method of acquiring information. This can involve using malware of course, but the term phishing refers to the actual process of attempting to get information from someone. Phishing often involves e-mails containing links to websites that are infected with malware.