Malware that stores all inputs made from keyboards and transmits to third party
Keylogger
Malware that monitors browsing locations, captures keystrokes, and watches user activity
Spyware
Malware that can replicate between systems without human intervention
Worm
Malware that modifies core system files and is often invisible to OS
Rootkit