0
Keyloggers, cryptojackers, spyware, and rootkits are all types of malware that hackers use to infect victims’ devices. While some of these infections let hackers remotely connect to the victim’s computer, others monitor the person’s keystrokes, use the system’s resources, or simply spy on the targeted person’s activity.