wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Spyware

profile
Harsha panchal
Aug 26, 2022
0 Likes
0 Discussions
90 Reads

Spyware (a portmanteau for spying software) is software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privacy or endangering their device's security. This behavior may be present in malware as well as in legitimate software. Websites may engage in spyware behaviors like web tracking. Hardware devices may also be affected.Spyware is frequently associated with advertising and involves many of the same issues. Because these behaviors are so common, and can have non-harmful uses, providing a precise definition of spyware is a difficult task.

History:-The first recorded use of the term spyware occurred on October 16, 1995 in a Usenet post that poked fun at Microsoft's business model. Spyware at first denoted software meant for espionage purposes. However, in early 2000 the founder of Zone Labs, Gregor Freund, used the term in a press release for the ZoneAlarm Personal Firewall. Later in 2000, a parent using ZoneAlarm was alerted to the fact that "Reader Rabbit," educational software marketed to children by the Mattel toy company, was surreptitiously sending data back to Mattel.

Since then, "spyware" has taken on its present sense.

Spyware is mostly classified into four types: adware, system monitors, tracking including web tracking, and trojans;examples of other notorious types include digital rights management capabilities that "phone home", keyloggers, rootkits, and web beacons. These four categories are not mutually exclusive and they have similar tactics in attacking networks and devices. The main goal is to install, hack into the network, avoid being detected, and safely remove themselves from the network.

Spyware is mostly used for the stealing information and storing Internet users' movements on the Web and serving up pop-up ads to Internet users. Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users.


Comments ()


Sign in

Read Next

Why Should You Schedule Tweets on Twitter?

Blog banner

Virtual Memory

Blog banner

Direct memory access (DMA)

Blog banner

Note Taker App

Blog banner

Be you

Blog banner

TAILS OS

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

ZOHO

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

?What Your Dentist Notices The Moment You Sit In The Chair

Blog banner

Introduction to GIS

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

To travel is to live

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

Virtual Machine

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Kernel in Operating System

Blog banner

Importance of education

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

WomenEmpowerment

Blog banner

Big Data Architecture

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

How Schools Can Reduce Exam Stress in Students?

Blog banner

What is process

Blog banner

VIRTUAL MACHINE

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

Operating System Objectives and Functions

Blog banner

Retiring ISS

Blog banner

Social engineering in cyber security

Blog banner

Deadlock

Blog banner

ProofHub

Blog banner

IT Service as as Value Creation

Blog banner

Process and Threading

Blog banner

Deadlock and Starvation

Blog banner

Recipe of Paneer Butter Masala

Blog banner

Virtual Memory

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

URL vs Domain

Blog banner

Smart Homes | Zigbee Alliance

Blog banner