A Trojan Horse is just one of many forms of malware.

Just under half of breaches involve some form of malware, according to Verizon. Malware, or malicious code, comes in many forms and can give hackers any number of capabilities, including complete control of an infected computer.

If a computer infected with malware is connected to a network, attackers can often access other connected systems and servers.

Unlike the old-school hacks that crashed people's computers, malware's job is to stay perfectly silent. The most sophisticated malware exists on a computer without its user ever knowing it's there.

Last updated July 29 2011: 5:11 AM ET
Join the Conversation
The cyber Mafia has already hacked you

Large, organized crime syndicates have been launching sophisticated attacks for decades.

Market indexes are shown in real time, except for the DJIA, which is delayed by two minutes. All times are ET. Disclaimer Morningstar: © 2014 Morningstar, Inc. All Rights Reserved. Disclaimer The Dow Jones IndexesSM are proprietary to and distributed by Dow Jones & Company, Inc. and have been licensed for use. All content of the Dow Jones IndexesSM © 2014 is proprietary to Dow Jones & Company, Inc. Chicago Mercantile Association. The market data is the property of Chicago Mercantile Exchange Inc. and its licensors. All rights reserved. FactSet Research Systems Inc. 2014. All rights reserved. Most stock quote data provided by BATS.