Espionage
Cyberwarfare
Rogue software
Cybercrime
Computing
Identity theft
Keystroke logging
Spyware
Surveillance
Screenshot
Computer keyboard
Internet privacy