Unsolicited bulk e‐mail that may contain malicious software. Spam is now said to account for around 81 percent of all e‐mail traffic.
A type of phishing attack that focuses on a single user or department within an organization, addressed from someone within the company in a position of trust and requesting information such as login IDs and passwords. Spear phishing scams will often appear to be from a company's own human resources or technical support divisions and may ask employees to update their username and passwords. Once hackers get this data, they can gain entry into secured networks. Another type of spear phishing attack will ask users to click on a link, which deploys spyware that can thieve data
Making a message or transaction appear to come from a source other than the originator. Spyware ‐ Software that collects information without a user`s knowledge and transfers it to a third party. Trojan horse ‐ A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.