Understand why hackers create Malware like Worms, Trojan Horses, Virus

  • Deleting, modifying, renaming, hiding, and replacing stored files
  • Depleting attached resources such as drives storages and network bandwidth
  • Overloading the whole network
  • Vulnerabilities creation and exploitation
  • Transferring controls to remote computers and criminals
  • Disrupting control and security settings
  • Damaging computer attached hardware resources
  • Damaging network resources



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
BPB Online

BPB Online

Enabling IT Students, Professionals & Developers by creating a 360˚ learning experience — Books | eBooks | Video Tutorials | Articles