Hacking

?
D N X V X Q C K Y W B W B O
U D C W O R M H R M Q L Q U
L G D V T S A X C F O L G M
O G U U R R F S H M Q V M R
I N B S O H K P E Y M X A O
Q I M V J E R R X F U I A X
U M W E A Y A O C L L S C V
L R F N N W F F C S K S Q E
M A B D Y Y F I V I R U S K
M H M P U A D W A R E X W L
T P S P M S K G R T A F V R
W R A C X N M F W D G T P S
E I C H O Y U J H D J H V H
L U M R M C C D L N R U M B

Clues

  • Applications that give ads. (6)
  • Collects data without consent. (7)
  • Disguises itself as legitimate software. (6)
  • Forcing people onto the wrong website. (8)
  • Spreading between devices. Needs to be activated. (4)
  • Spreading between devices. Self replicating. (5)

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Networks resources »