1. Phishing: bogus emails asking for security information and personal details
  2. Webcam manager: where criminals takeover your webcam
  3. File hijacker: where criminals hijack files and hold them to ransom
  4. Keylogging: where criminals record what you type on your keyboard
  5. Screenshot manager: allows criminals to take screenshots of your computer screen
  6. Ad clicker: allows a criminal to direct a victim’s computer to click a specific link
  7. Hacking
  8. Distributed Denial of Service (DDOS) attacks