1. INTERNET HOAX- a deliberate attempt to deceive or to trick people into believing or accepting something which the hoaxer (the person or group creating the hoax) knows is false.
2. SPAM- use of electronic messaging systems (including broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately.
3. VIRUS- a computer program that can copy itself and infect a computer. The term virus is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another ( in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or usb drive.
4. TROJAN- sometimes referred to as trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. The term is derived from trojan horse story in Greek mythology.
5. SPYWARE- a type of malware that is installed on computer's and collects little bits of information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect.
6. ADWARE- any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software.