Chapter 5. Malware Threats
This chapter covers the following topics:
Viruses and worms: This category of malware continues to be a real threat and can be used to launch many different types of attacks.
Trojans: Trojans are one of the top malware threats today and can be used for anything from spying on a user to controlling the user’s system.
Covert communication: Any means of sending information in some way that is not usually allowed is considered ...
Get Certified Ethical Hacker (CEH) Version 9 Cert Guide, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.