This document defines and describes several common types of malware and cyber threats. It explains that viruses, worms, and Trojan horses are programs that can infect computers without permission and open them up to attacks. It also discusses phishing scams, spyware, adware, wireless hacking, bluejacking which steals Bluetooth data, and social engineering which tricks users into revealing private information.