Known as junk email. Unsolicited commercial email sent from one source with identical message sent to multiple recipients. Dangerous spams carry virus like Trojan Horse and other malicious software (malware_
eMAIL SPAM
Inserts malicious code into a program or data file
virus
track user's web surfing history and activity to optimize advertising efforts
tracks a user's web surfing history and activity to optimize advertsing efforts
adware
when used maliciously can track a user's web activity for gaining information
cookies
a digital attack that disguises itself as desirable code or software
trojan
a type of spyware that monitors user activity
keylogger
captures virtually everything the user does on an infected device
operates undetected in the background, staking information such as passwords, and messages
mobile spyware
automatically redirects without requiring users to click a link
pharming
spreads more slowly
virus
inserts malicious code into a program or data file. user tranfers infected files to other devices
virus
exploits vulnerability in application or operating system. uses a network to travel from one computer to another.
worm
masquerades as performing s benign action but also does something malicious. user transfers trojan file to other computers