hat do hackers use to change public keys and prevent authorized users from accessing their own data?

(1 point)
Responses

cryptovirology

cryptovirology

infiltration

infiltration

malware

malware

ransomware

Hackers use malware, specifically ransomware, to change public keys and prevent authorized users from accessing their own data. Cryptovirology is a field that studies the combination of cryptography and computer viruses, which can be used by hackers to carry out these malicious activities. Infiltration refers to the act of gaining unauthorized access to a system or network but does not specifically address the manipulation of public keys.