Web pages that host application which is covertly downloaded to the consumer's device to gather information and observe user activity, and websites which can be contaminated with harmful or malicious software package, exclusively built to destruction, disrupt, assault or manipulate Pc methods without the user's consent, such as virus or trojan hors