This document summarizes information about malware threats, including viruses, worms, Trojan horses, joke programs, hoaxes, and logic bombs. It discusses the types and examples of different malware, how they spread, their potential impacts, and an incident management model for preparation, detection, containment, eradication, recovery, and reporting of malware incidents. The summary concludes by stating that malware will continue to evolve and there is no single solution, requiring ongoing mitigation and management efforts.