Would like to learn about malware and how it is implemented

I'm just about completely new to hacking/cybersecurity- related affairs and would like to learn about malware, mainly Trojan horses and specifically those that plant cryptocurrency miners or perhaps ransomware. How do these work, where can they be found, how are they implemented and is it legal to possess them? If possible, please explain in simple terms.

P.S.: I feel like I should add that this is just for fun and to satisfy my curiosity, not for malicious or criminal reasons

Thank you for your help!

submitted by /u/Antique__throwaway
[link] [comments]

from hacking: security in practice https://ift.tt/h4fvXkA

Comments