Spyware/malware
Trojan Horse
A computer program is either hidden inside another program or that masquerades as something it is not in order to trick potential users into running it. For example a program that appears to be a game or image file but in reality performs some other function. (A malicious program that hides within or looks like a legitimate program.)
Computer Worm
A malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers.
Hacker
A person who secretly gains access to computers and files without permission.
Virus
A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Adware
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Spyware
Any software application that covertly gathers information about a user's Internet usage and activity and then exploits this information by sending adware and pop-up ads similar in nature to the user's Internet usage history. (it's a type of malware)
Browser HiJaker
Browser hijacking is the modification of a web browser's settings by malware, spyware or a virus. The term "hijacking" is used as the changes are performed without the user's permission. A browser hijacker may replace the existing home page, error page, or search page with its own
EULA
End-User License Agreement (EULA) is a document associated with a standalone software program which explains the legal regulations for using the software.
Keystroke Logger
Keystroke logging, often referred to as keylogging or Keyboard Capturing, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored
Riley
Parise
Malware
software designed to infiltrate or damage a computer system without the user's informed consent
Phishing
the activity of defrauding an online account holder of financial information by posing as a legitimate company.
Spam
unwanted e-mail (usually of a commercial nature sent out in bulk)