1.Spyware
2.Ransomware
3.Keylogger
4.Phishing
5.Rootkit
6.Backdoor
7.Scam
8.Botnet
9.Phishing Scam
10.Adware