The tools that cyber criminals often use, including computer viruses, worms, trojan horses and spyware, are called . Solution most of the cyber crimes are committed by the individuals or small groups and their attack techniques ie there are few type of attacks that cyber criminal use to commit crimes ie botnet -a network of software robots or bots that automatically spread malware , fast flux- moving data quickly among the computers in botnet to make it difficult to trace the source of malware or phishing websites , zoombie computer - a computer that has been hacked into and is used to launch malacious attacks or to become part of botnet , social engineering - using lies and manipulation to trick people into revealing their personal information and phishing is form of social engineering and this attack include ie sending a victims an email that claims theirs problem with their account and has a link to fake the website and entering their account information into the site sends it atraight to the cyber criminal and trying to convince victims to open an email attachments that contain malware by claiming it is something that might enjoy or need and pretending to be network or account administrator and asking for the victims password to perfom maintainance and claiming that victim has won prize must give the credit card informaition in order to receive it and asking for the victims password for an internet service and then using the same password to access other accounts and servicessince many people reuse the same password and promising the victim that they wil send the millions of dollarsif they help out sender by giving the money or the bank account information there are some gey hat hackers who wants to come clean and turn away from crime an option is to work for the people they used to torment by becoming security consultant in past they were black hat hackers who use their computer expertise to break into the computer systems and steal information illegally . therefore the tools that cyber criminals often use including computer viruses , worms torjan horses and spyware are called spam denial of service hacking malware. typically a spam is sent to multiple receipients who didnot ask to recieve it and it includes email spam and instant messaging spam , websearch engine spam spam inn blogs and mobile phone messaging spam and it includes misleading advertisements and phishing messages and designed to trick reciepients in giving personal information and financial information .these are the tools that cyber criminals use..