Malware is nothing new, and hackers have been using different malware ideas to hack information. In this discussion, you will identify the different types of malware and the popularity of each type. : Your response should rely upon at least two sources from professional literaturearticles from peer-reviewed journals and relevant textbooks. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and
attribution of sources; and use accurate spelling, grammar, and punctuation. By , in a minimum of 250 words, post your response to the appropriate . Through , review and comment on at least two of your peers responses. Consider the following in your response: All discussion assignments in this course will be graded using a rubric. This assignment is worth 40 points. Download the discussion rubric and carefully read it to understand the expectations.