We are constantly installing new software and add-ons, but how do we know if this software is safe to use? In this video, you’ll learn about add-ons and attachments, and I’ll give you some real-world examples of malicious add-ons.
The bad guys know that attachments and add-ons are some of the easiest ways to attack our computer systems. In this video, you’ll learn about malicious attachments and how some bad guys have used add-ons to take over our PCs.
What kind of malicious software falls into the category of “annoying” software that doesn’t cause serious operational problems?
Which of these would best describe a category of malicious software that is able to spread without any type of human interaction?
What category of malicious software gains access to your system by disguising itself as something nonthreatening? Choose the best answer.