wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Spyware

profile
Harsha panchal
Aug 26, 2022
0 Likes
0 Discussions
90 Reads

Spyware (a portmanteau for spying software) is software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privacy or endangering their device's security. This behavior may be present in malware as well as in legitimate software. Websites may engage in spyware behaviors like web tracking. Hardware devices may also be affected.Spyware is frequently associated with advertising and involves many of the same issues. Because these behaviors are so common, and can have non-harmful uses, providing a precise definition of spyware is a difficult task.

History:-The first recorded use of the term spyware occurred on October 16, 1995 in a Usenet post that poked fun at Microsoft's business model. Spyware at first denoted software meant for espionage purposes. However, in early 2000 the founder of Zone Labs, Gregor Freund, used the term in a press release for the ZoneAlarm Personal Firewall. Later in 2000, a parent using ZoneAlarm was alerted to the fact that "Reader Rabbit," educational software marketed to children by the Mattel toy company, was surreptitiously sending data back to Mattel.

Since then, "spyware" has taken on its present sense.

Spyware is mostly classified into four types: adware, system monitors, tracking including web tracking, and trojans;examples of other notorious types include digital rights management capabilities that "phone home", keyloggers, rootkits, and web beacons. These four categories are not mutually exclusive and they have similar tactics in attacking networks and devices. The main goal is to install, hack into the network, avoid being detected, and safely remove themselves from the network.

Spyware is mostly used for the stealing information and storing Internet users' movements on the Web and serving up pop-up ads to Internet users. Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users.


Comments ()


Sign in

Read Next

I/O Buffering

Blog banner

Scheduling

Blog banner

Starvation and Deadlock.

Blog banner

Memory management

Blog banner

Virtual memory

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

Bit Coins

Blog banner

The Sunny Side of Instagram

Blog banner

AI and cyber Security

Blog banner

Memory Management

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Outlook mail

Blog banner

Concept and definition of m-commerce

Blog banner

From Model Mistakes to Metrics

Blog banner

Hash password! Is it really secured?

Blog banner

Security requirements for Safe E-Payments

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

38_Exploring The Honeynet Project

Blog banner

Basic Security For SOAP Services

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

Understanding Regression Analysis

Blog banner

About myself

Blog banner

Why Mumbai Professionals Are Switching Back to Home-Style Tiffin Meals

Blog banner

Security Issues and Countermeasures

Blog banner

Characteristics of Etherum

Blog banner

Thumb Sucking: When It’s Normal and When It Becomes a Dental Problem

Blog banner

PROCESS STATE:

Blog banner

The Role of cryptography in cyber security

Blog banner

Depression

Blog banner

Threads

Blog banner

MYNTRA

Blog banner

Deadlock Prevention

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Service design process in ITSM

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

Data is an asset and it is your responsibility!

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

VIRUS

Blog banner

Footprinting

Blog banner

Development Of Modern Operating System

Blog banner

Uniprocessor and Types

Blog banner