wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Spyware

profile
Harsha panchal
Aug 26, 2022
0 Likes
0 Discussions
92 Reads

Spyware (a portmanteau for spying software) is software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privacy or endangering their device's security. This behavior may be present in malware as well as in legitimate software. Websites may engage in spyware behaviors like web tracking. Hardware devices may also be affected.Spyware is frequently associated with advertising and involves many of the same issues. Because these behaviors are so common, and can have non-harmful uses, providing a precise definition of spyware is a difficult task.

History:-The first recorded use of the term spyware occurred on October 16, 1995 in a Usenet post that poked fun at Microsoft's business model. Spyware at first denoted software meant for espionage purposes. However, in early 2000 the founder of Zone Labs, Gregor Freund, used the term in a press release for the ZoneAlarm Personal Firewall. Later in 2000, a parent using ZoneAlarm was alerted to the fact that "Reader Rabbit," educational software marketed to children by the Mattel toy company, was surreptitiously sending data back to Mattel.

Since then, "spyware" has taken on its present sense.

Spyware is mostly classified into four types: adware, system monitors, tracking including web tracking, and trojans;examples of other notorious types include digital rights management capabilities that "phone home", keyloggers, rootkits, and web beacons. These four categories are not mutually exclusive and they have similar tactics in attacking networks and devices. The main goal is to install, hack into the network, avoid being detected, and safely remove themselves from the network.

Spyware is mostly used for the stealing information and storing Internet users' movements on the Web and serving up pop-up ads to Internet users. Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users.


Comments ()


Sign in

Read Next

Open Source Project By Google

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

Virtual Memory

Blog banner

Supervised and Unsupervised Learning

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

Cache Memory(142)

Blog banner

Bharat Maps

Blog banner

The launch of UniMap by HERE

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Virtual Machine

Blog banner

Pandas Matrix Applications

Blog banner

Define Instagram.

Blog banner

Virtual Memory

Blog banner

Artical on FreshBooks

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Banaras

Blog banner

Self-love: Being the reason of your own smile

Blog banner

TRIGGERS IN DATABASE

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

CRISP-DM Methodology

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

How to use open SSL for web server - browser communication

Blog banner

Khau Galli – Vile Parle

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

IT RISK

Blog banner

Twisted world

Blog banner

DISK SCHEDULING

Blog banner

Deadlock

Blog banner

What is Influencer Marketing and its Trends

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

Data Structures

Blog banner

GIS

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

Deadlock in operating system

Blog banner

Memory management

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Cyber Forensics

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner