What do hackers use to change public keys and prevent authorized users from accessing their own data?
A. cryptovirology
B. infiltration
C. malware
D. ransomware
1 answer
D. ransomware
A. cryptovirology
B. infiltration
C. malware
D. ransomware
1 answer