Malicious code that exploits known vulnerabilities and is self replication
Worms
Malware the evades pattern matching detection by frequently changing identifiable charactersits
Polymorphic
Unique patterns or characteristics
Signatures
Instructions to be executed when a certain event or time occurs
Logic Bomb
Also known as potentially unwanted applications
Bloatware