What do hackers use to change public keys and prevent authorized users from accessing their own data?
A. Cryptovurology
B. Infiltration
C. Malware
D. Ransomware
1 answer
D. Ransomware
A. Cryptovurology
B. Infiltration
C. Malware
D. Ransomware
1 answer