spam
The electronic equivalent of junk mail
vulnerability
Weakness in software or other mechanism that threatens the confidentiality, integrity, or availability of an asset (recall the CIA model). It can be directly used by a hacker to gain access to a system or network
zombies
Computers infected with malware that are under the control of a spammer, hacker, or other criminal