Malicious software created to damage or gain illegal access to a computer system. (e.g. Trojan Horse, virus, spyware etc.)
When someone sends an e-mail or text pretending to be a well-known business, asking the recipient to share their personal information (e.g account number, password).