Professional Documents
Culture Documents
What Is Spyware
What Is Spyware
What Is Spyware
Spyware- this is software that is designed to harvest your data and forward it to a
third party without your consent or knowledge. The data collected is sent to the
creator of the application or perhaps a third-party, and can be stored in a way that is
recoverable at later time. Some spyware programs may monitor key presses
('keylogger'), collect confidential information such as (passwords, credit card numbers,
PIN numbers, etc.), harvest e-mail addresses or track browsing habits. In addition to all
of this, spyware inevitably affects your computer’s performance.
Types of Spyware
Adware, Pornware, and Riskware These are legitimately developed programs that – in
some circumstances – can be used to pose specific threats to computer users
(including acting as spyware).
What is adware?
Adware, also known as advertisement-supported software, generates revenue for its
developers by automatically generating adverts on your screen, usually within a web
browser. Adware is typically created for computers but can also be found on mobile
devices. Some forms of adware are highly manipulative and create an open door for
malicious programs. Moreover, Adware is software that displays unwanted (and
sometimes irritating) pop-up adverts which can appear on your computer or mobile
device.
Adware creators and distributing vendors make money from third parties via either:
1. Pay-per-click (PPC) — they get paid each time you open an ad.
2. Pay-per-view (PPV) — they get paid each time an ad is shown to you.
3. Pay-per-install (PPI) — they get paid each time bundled software is installed on a
device.
Adware can also track your search and browsing history to display ads that are more
relevant to you. Once the developer has your location and browser history, they can
make additional income by selling that information to third parties.
Computer adware infection signs
An unexpected change in your web browser home page
Web pages that you visit not displaying correctly
Being overwhelmed with pop-up ads — sometimes even if not browsing the internet
Slow device performance
Device crashing
Reduced internet speeds
Redirected internet searches
Random appearance of a new toolbar or browser add-on
Mobile adware infection signs
On your phone, signs are similar:
Some adware is aggressive – it embeds itself deep into systems with rootkits to make
removal challenging. If you are infected, you’ll need to take steps to clean your system
of the offending applications.
Pornware is the name given to a class of programs that display pornographic material
on a device. In addition to the programs that some users may deliberately install on their
computers and mobile devices – to search for and display pornographic material.
Moreover, Pornware also includes programs that have been maliciously installed,
without the user having any knowledge of their presence. Often, the purpose of
unrequested Pornware is to advertise fee-based pornographic websites and services.
These programs are not designed to be malicious — but they do have functions that
can be used for malicious purposes. When used with bad intentions, the riskware
program can be viewed as malware. This grey area of safety makes riskware an
especially challenging threat to manage.
Unfortunately, cyber security protections cannot simply manage these threats for you.
Antivirus solutions leave the decision-making in your hands to avoid damaging your
system and taking away tools you’d like to keep. As a result, it’s up to you to be aware
of the risks from software on your system.
To begin, let’s start with why riskware exists and explain how it works.
Software with deeper functionality can provide many valuable tools and features to
endpoint users and technical support staff. Namely, some benefits might include user
monitoring, personalization, and modifying applications to bypass tedious aspects of
use.
However, risks come with the use of particularly sensitive data or unethical practices.
This risky software usually leaves systems or users vulnerable in one of two major
ways.
1. Data and program exploits — due to vulnerability of program misuse or data breaches.
2. Legal risks — due to blatant abuse of privacy or illegal attempts to modify programs.
Rather than focus on specific types of riskware, it’s more effective to label them by the
types of risks they introduce. Riskware can generally be grouped based on several
types of risks they introduce to your computer and mobile devices.
Endpoint users are the biggest points of impact resulting from riskware misuse and
exploitation. Most of the issues you may face can be simplified to the following core
problems:
In many cases, legitimate riskware can be modified to function as malware. Then, the
attacker would distribute it either as a direct attack or a backdoor for loading other
malware onto your system.
With so many legitimate programs that malicious users can employ for illicit purposes; it
can be difficult for users to decide which programs represent a risk.
However, if such a program has been installed on your computer by a malicious user,
that user will have remote access to your computer. With full control unauthorized over
your machine, the malicious user will be able to use your computer in virtually any way
they wish.