A Distributed Denial of Service attack. When botnets flood a target system to overwhelm and crash it.

Automated malware that lets hackers remotely control your computer.

Malware that burrows deep into your system to hide itself. Notoriously hard to detect and remove.

Malware that bombards you with unwanted ads. More annoying than dangerous, but still a pain.

Malware that encrypts your files and demands payment for the decryption key. Nasty stuff.

Malware that spies on your computer activity, collecting personal data to send to hackers.

A self-replicating virus that spreads over networks without needing to piggyback on another program.

Malware that spreads by copying itself, like a biological virus. Evolved into more advanced forms:

Malware disguised as legitimate software. Named after the famed Trojan Horse.

Catch-all term for malicious software like viruses, spyware, and ransomware. Only download from trusted sources.