Elevated threats are usually threats that fall into the range of adware in which data about a user's habits are tracked and sent back to a server for analysis without your consent or knowledge.
A program that runs in the background, recording all the keystrokes.
'Napster, Gnutella, etc claim that users are anonymous when transferring MP3s. This is NOT true. Using Spyster it is very easy to see who is connected. Spyster shows connection information much like netstat. Users can see the IP Addresses and Ports of use
Trojan - A key logger program runs in the background, recording all the keystrokes made by a user. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped secretly raw to the attacker via email or over the Internet.