| 4 Theft and Destruction of Property: Data Attacks |
| 5 Picking Locks: Password Attacks |
| 6 Evil Automatons: Malware, Trojans, Viruses, and Worms |
| 7 Eavesdropping and Snooping for Information: Sniffers and Scanners |
| 8 Impersonation and Infiltration: Spoofing |
| 9 Everything Else |
| |
| Top |