Tracks a user's personal information without the permission and passes to a third party
Creates a hole in system security in order to obtain remote access to a computer for spam, spying, or other malicious actions.
Masquerades as another, harmless program and allows other hackers to gain access to your computer through a security hole.
Floods a user's inbox with spam mail until the system crashes.
A way to control cellular calls or to use a cellphone as a scanner.
Copies the original information from the target computer to the destination folder on a remote computer.
Denial of Service
Clogs the network connections to a target computer by exhausting computer resource and wasting network bandwidth with requests for service.
Automatically downloads and runs/installs/updates malicious software without the user's permission.
Carrier program which installs a virus or malware on the target computer
Program or technique used for breaking onto or attacking another computer through security breaches in the network.
Overloads a network connection with massmailing or fast pinging, etc, in order to cause a Denial of Service.
Used by unauthorized user to facilitate an attack or intrusion upon a target computer in order to gain information or control its function.
An overblown, hyperemotional warning about a false threats which urge users to forward them to everyone they know, thereby clogging networks.
Records keystrokes and makes a log of keyboard activity to obtain usernames and passwords for accessing other computers.
A cluster of viruses which can attack a target computer on several levels.
Infects documents or replicates using the internal macro language of an application.
Infects target computer, then distributes itself from via mass emailing to other computers using the target computer's address book.
Performs TCP/IP DoS attacks to crash Windows machines that had not been properly secured.
Sends ICQ messages (WWW pager, regular messages, URL messages) to several target computers simultaneously.
Steals and decrypts a password via bruteforce or algorithmic cracking.
Sends a seemingly-legitimate scam e-mail to a user in an attempt to make the user volunteer private information that will be used for identity theft.
Verifies that a particular Internet address exists and can accept requests.
Attempts to connect to all ports on a target machine to see if anybody is listening on those ports and if they are vulnerable to attack. Script--attacks an unsecured computer via instructions to Microsoft scripting applications.
Collects information sent in computer network traffic by standing between the sender and the receiver.
Sends spoofed messages that will crash a user's ICQ (A conferencing program for the Internet). Spammer—extracts email addresses from internet sources and sends unsolicited/spoofed email to these addresses, possibly installing a backdoor for later use.
Gathers information from a target machine without the user's knowledge or permission. May use "bots" to collect information.
A seemingly harmless or legitimate program which either carries executable viruses or performs malicious actions against a target computer.
A program made by a programmer for use by non-programmers so they can create a virus.
Non-hosted virus program which makes and distributes copies of itself to other computers using email or other transport medium in order to attack them.