: Attackers use the names of trending celebrities or sports stars to bypass users' natural caution.
: Software that locks your personal files and demands payment to release them.
: Move the file to your trash and empty it.
: Programs that look legitimate but give hackers access to your PC.