Malware | Phishing | |
---|---|---|
What is it? | Applications or links that install malicious software | What is it? Attackers pretending to be a genuine entity |
What does it do? | Accesses the computer's network, deals damage, and gathers private information | Installs malware or leaks sensitive information |
What are examples? | Viruses, worms, ransomware | Emails, voice calls |
How is it prevented? | Avoid suspicious websites or applications; update and secure your system | Avoid opening suspicious emails and links; do not disclose personal information |