Extremely Easy Security — Learn Cyber Attack Types in Plain English (1.2 Part 1)

Malware

Ransomware

Something like that.
A hacker waits for Steve to pay ransom, but Steve only has Monopoly money.

Trojans

Supposed to be a Trojan horse, but just looks like a sad, triangular shaped real horse with wheels for feet.

Worms

PUPs

Fileless Malware

Matthew has searched all the files but can’t find anything suspicious.

Up Next: Oh No! “Learn Cyber Attack Types in Plain English (1.2 Part 2)” isn’t out yet, but it will be soon. You can subscribe.

--

--

--

Writer, ethical hacker, humorist. Extremely Easy Security.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

10,000 Potatoes plan to build a community of Venture Capitalists!

Stop crime before it happens

How to Approach Risk Management for Autonomous Maritime Systems

AMA RECAP :BOSS × DIVS.io

I was Offered $5k/month to Hack WordPress Sites

Medium’s Guidelines for Law Enforcement

War Never Changes: Attacks Against WPA3’s Enhanced Open — Part 1: How We Got Here

the server’s security certificate is not yet valid

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
easysecurity

easysecurity

Writer, ethical hacker, humorist. Extremely Easy Security.

More from Medium

Vulnerability Assessment and Penetration to Linux OS with Nessus

2nd Simple & White-collar things about CyberSecurity

Linux Command you should know:

Extremely Simple Security — Learn Cyber Threats, Attacks & Vulnerabilities (Social Engineering, 1.1)