Identify and describe some of the malware employed by terrorists, hacktivists, corporate spies, criminals, and pleasure seekers.