Disguised as legitimate software.
Replace or modify legitimate software to harm.
Often spread through email attachments or infected websites.
Monitors user activities on the computer.
Collects and sends gathered information to cybercriminals.
Can include keyloggers to capture keystrokes.
Floods computers with unwanted advertising.
Can hijack browsers or create pop-ups.
May highlight security weaknesses.