Dump 1 of 3.
Some quick tid bits.
RAT = Remote administration tool. Allows you to control the targets computer.
>>You can be hacked just by your IP address if you have vulnerable programs running.
>> Programs that auto-update can be hacked server side and then an infected update pushed.
>>You can be hacked just by visiting a URL even today - new exploits for browsers are found all the time.
>>RFID cloning is a thing. You can clone peoples badges/tags to enter their buildings within a few seconds.
>>In the majority of cases it is better to unplug or turn off your internet if you are infected. Some on reboot will encrypt your entire computer. Leaving it on and not letting any data escape while being able to use a USB with any virus removal tools you need is preferred.
>>USBs and phones can infect your computer in only a few seconds acting like a keyboard (rubber ducky is the attack) they will quickly type out a payload and take passwords or put a virus on your computer extremely fast.
>>A MiTM or Man in the middle attack is when your wifi is hacked or you are using a hacked/monitored connection - Through this an attacker can see http requests including images, passwords, websites you visit and more. They can also swap out files you download with infected files or craft malicious links that autodownload or infect.