I: Ransomware a. Definition b. Why ransomware? c. Ransomware examples II. Malware distribution through email a. Malicious spam (malspam) is the most common distribution method b. What these emails consist of (types of attachments, links, etc.) III. Malware distribution through social media a. Skype example b. A targeted example IV. Malware distribution through web browsing a. Popup browser windows b. Exploit Kits c. The declining importance of exploit kits V. Malware versus the Internet of Things (IoT) a. Ransomware for IoT devices b. IoT botnets VI. Data breaches a. Majority of data breaches involve weak, default, or stolen passwords b. Top 3 methods used in data breaches c. Web app attacks resulted in most data breaches