: Attackers use the names of trending celebrities or sports stars to bypass users' natural caution.

: Software that locks your personal files and demands payment to release them.

: Move the file to your trash and empty it.

: Programs that look legitimate but give hackers access to your PC.