Crackers: embed malicious active content
Trojan horse
Program hidden inside another program or Web page
Masking true purpose
May result in secrecy and integrity violations
Zombie (Trojan horse)
Secretly takes over another computer
Launches attacks on other computers
Botnet (robotic network, zombie farm)
All controlled computers act as an attacking unit