# [Understand malware & other threats](index.md) ## [Prevent malware infection](prevent-malware-infection.md) ## [Malware names](malware-naming.md) ## [Coin miners](coinminer-malware.md) ## [Exploits and exploit kits](exploits-malware.md) ## [Macro malware](macro-malware.md) ## [Phishing](phishing.md) ## [Ransomware](ransomware-malware.md) ## [Rootkits](rootkits-malware.md) ## [Supply chain attacks](supply-chain-malware.md) ## [Tech support scams](support-scams.md) ## [Trojans](trojans-malware.md) ## [Unwanted software](unwanted-software.md) ## [Worms](worms-malware.md) # [Submit files for analysis](submission-guide.md) # [How Microsoft identifies malware and PUA](criteria.md) # [Industry antivirus tests](transparency-report.md) # [Industry collaboration programs](cybersecurity-industry-partners.md) ## [Virus information alliance](virus-information-alliance-criteria.md) ## [Microsoft virus initiative](virus-initiative-criteria.md) ## [Coordinated malware eradication](coordinated-malware-eradication.md) # [Information for developers](developer-info.md) ## [Software developer FAQ](developer-faq.md) ## [Software developer resources](developer-resources.md)