Malware Word Search

Edit Answers
RKKLJKZHGYDDFSRQPKUA RSECURITYSECURITYWIJ XMLTWCYMMFNMBKLWRGFL BWFSMUQGIQMWZYRRGFYD PNMWTSRWTWFAFORVXMQT WXGAPIPMBOJCQHAFLYRK YWAZGTAYAFSKWYNPJERG ZSSCGCSSOOMLZOSJGBJR LFOOEHIMMEPAANOYPUYZ XVQYGZXOHYYHLJMGLQTE HEYHRKJOYFWCMHWNJOGS RAAUDKLELVHHTAEIALYS YJSGFJRSUNXRKGRHFYQG DZVRGEAVELFYVGESQNOP EIVUWRWVDQNZNMCILOLF TZWITAEGBGEQSSLHLAME OIDRNWBKQTTOJOVPROYO MUUILLQPMRTMXNEEFEPX EODBYAUBIHBURONIRISV RZYHDMLPWRCDMAEQTTDI
1.
Software designed to gain access to damaged software computer system
2.
when a scammer claims to represent a company online
3.
blocks access to a phone that steals money
4.
access the ability to control your devices through others people phone
5.
breach data that a company stores is exposed to a hacker.
6.
questions identifying customers when they forget a password etc.
7.
It makes it harder for a hacker to gain access to your devices.