This document provides an overview of different types of malware such as viruses, trojans, worms, spyware, and adware. It discusses how viruses replicate and infect other programs. Malware can be used by hackers to steal personal information, delete files, conduct click fraud, and more. The document outlines the history of major malware incidents from 1999 to 2003 and provides statistics on malware growth over time. It also describes spam email and how spyware and adware work to monitor users and display advertisements.