1. Spear-phishing attack: By email to install malware
2. Zero-day Exploits: Security hole unknown to vendor during product release.
3. Customized Malware: Malicious software that avoids the detection by traditional security technologies
4. Drive-by-Download: Infects the computer while visiting website running malicious code
5. Social Engineering: By manipulating people