This document summarizes common internet security threats and countermeasures. It describes how automated tools are used to try all possible password combinations to gain access to accounts. Phishing involves creating fake websites to steal user passwords, credit card numbers, and other sensitive information. Trojan horses hide unauthorized programs inside authorized ones to access and steal victim's data. Cross-site scripting and SQL injection are security vulnerabilities that allow hackers to inject malicious code and access restricted resources. The document provides tips to secure accounts, such as using strong and unique passwords, updating software, and avoiding suspicious links and attachments.