Source: Astro Awani & New Straits Times
Tricks you into installing a software on your device and allowing access your files or observe your activities on the device.
A type of malware that lurks on your device and monitors your activity by accessing your camera/microphone.
e.g. A pop-up requesting you to download a new app
Also known as Credential Stealers, it obtains your usernames, passwords and online payment details by tracking your keystrokes.
e.g. Observing your payment methods on e-commerce sites
Installed on your device and gain unauthorised access to your bank account by recording your login details when you log in on an infected device.
e.g. Monitoring you as you log into your bank account via tablet
A collection of devices that launch coordinated spams or denial-of-service attacks online. Your device may be forcibly used as part of a botnet by malware that has been installed.
e.g. Your device performs automated tasks without your consent