Research should include
viruses, worms, and Trojan horses
brute-force attacks
privacy invasion tools (e.g., spyware, malware, ransomware, cookies, adware, popups)
spam.