Este documento define y explica brevemente varios tipos de ciberdelitos y amenazas cibernéticas, incluyendo botnets, carding, crackers, grooming infantil, crimeware, dialers, exploits, firewalls, floods, gusanos, hackers, hijacking, hoaxes, keyloggers, malware, moobing, pharming, phishing, re-mailers, scams laborales, smishing, spam, spammers, listas de spam, spear phishing, spoofing, pump and dump, virus, troyanos y vishing.