Ransomware
Cryptojacking
Trojan
Adware
Spyware
Phishing
Botnet
Vishing
Smishing
Hoax
Software that secretly gathers information about a user's activities.
Phishing attacks conducted over voice calls.
Attempt to trick people into sharing sensitive information by pretending to be a trustworthy source.
A network of compromised computers controlled by a hacker.
Unwanted software that displays advertisements on a computer.
A harmful software disguised as something useful or legitimate.
Unauthorized use of someone else's computer to mine cryptocurrency.
Malicious software that encrypts files and demands payment for their release.
False information shared to deceive or trick people.
Phishing attacks through SMS or text messages.