By default, data is shown for all categories. Select different categories and the map and corresponding data will recalculate.
Spam
Unsolicited junk mail.
Malware
Software with malicious intent.
Badware
Software that fundamentally disregards a user's choice regarding how their computer will be used.
Botnets
Collections of computers running a (typically) unwanted program as a zombie, controlled by a "command & control" server, used to attack other computers or to harvest sensitive information.
Phishing
Fraudulent emails that appear to be from a trusted source and trick users into entering personal information.
Cybercrime hubs
Servers or networks that support or control the spreading of malicious software or exploits.
Current events
A blend of the most up-to-date attack variants and zero-day exploits.