Spamming
Internet
Rootkits
Phishing
Social engineering
Backdoor
Infrastructure
Email
Computer virus
Espionage
Cybercrime
Malware