4 Theft and Destruction of Property: Data Attacks |
5 Picking Locks: Password Attacks |
6 Evil Automatons: Malware, Trojans, Viruses, and Worms |
7 Eavesdropping and Snooping for Information: Sniffers and Scanners |
8 Impersonation and Infiltration: Spoofing |
9 Everything Else |
Top |