Identify and describe some of the malware employed by terrorist, hacktivists, corporate spies, criminals, and pleasure seekers.