wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Spyware

profile
Harsha panchal
Aug 26, 2022
0 Likes
0 Discussions
90 Reads

Spyware (a portmanteau for spying software) is software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privacy or endangering their device's security. This behavior may be present in malware as well as in legitimate software. Websites may engage in spyware behaviors like web tracking. Hardware devices may also be affected.Spyware is frequently associated with advertising and involves many of the same issues. Because these behaviors are so common, and can have non-harmful uses, providing a precise definition of spyware is a difficult task.

History:-The first recorded use of the term spyware occurred on October 16, 1995 in a Usenet post that poked fun at Microsoft's business model. Spyware at first denoted software meant for espionage purposes. However, in early 2000 the founder of Zone Labs, Gregor Freund, used the term in a press release for the ZoneAlarm Personal Firewall. Later in 2000, a parent using ZoneAlarm was alerted to the fact that "Reader Rabbit," educational software marketed to children by the Mattel toy company, was surreptitiously sending data back to Mattel.

Since then, "spyware" has taken on its present sense.

Spyware is mostly classified into four types: adware, system monitors, tracking including web tracking, and trojans;examples of other notorious types include digital rights management capabilities that "phone home", keyloggers, rootkits, and web beacons. These four categories are not mutually exclusive and they have similar tactics in attacking networks and devices. The main goal is to install, hack into the network, avoid being detected, and safely remove themselves from the network.

Spyware is mostly used for the stealing information and storing Internet users' movements on the Web and serving up pop-up ads to Internet users. Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users.


Comments ()


Sign in

Read Next

Chicken Dum Biryani

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

GIS Bharat Maps

Blog banner

Models of Information Security.

Blog banner

The Memory Hierarchy

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

Security Issues

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

TEAMWORK

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Fitness

Blog banner

How Preschool Annual Day Shapes Confidence, Emotions, and Growth

Blog banner

 " Healing of Yoga "

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Cache memory

Blog banner

Beyond the Track: Why the Best Hotel in Arcadia, Florida, Completes Your IMSA Sebring Getaway

Blog banner

Challenges and risks in service operations

Blog banner

Computer security techniques

Blog banner

BUFFER OVERFLOW_142

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner

semaphores in os

Blog banner

The most common internet security threats

Blog banner

Cross site scripting Attack

Blog banner

Satellite Based Positioning

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

Process and Threading

Blog banner

Deadlock

Blog banner

Earth with no trees

Blog banner

Consumer to consumer business mode

Blog banner

Virtual memory in windows

Blog banner

Blog on health and fitness

Blog banner

Deadlock

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Importance Of Blockchain

Blog banner

Fashion design

Blog banner

Predicting Student Performance with Data Science

Blog banner

Synchronization

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

MOVEMBER

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

Mumbai

Blog banner