Malicious Applets
Once malicious code gets control of the machine it can:
-  Compromise the user's privacy
 -  Actively snoop the user's keystrokes
 -  Steal resources to:
	
	-  Orchestrate a DDoS attack
	
 -  Send spam mail
	
 -  Spread viruses
	
 
 
 -  Dial long-distance calls
 -  Impersonate on behalf of the user (including certificate authentication)
 -  Distribute sensitive documents