Information security post. Part Two: Types of Malware.

Greetings, dear reader! In the first part of a series of blogs about information security, I…