Methods of Spyware Infection

Spyware can be placed on a system in a number of different ways, each offering its own benefits. Once the software is installed, it stays hidden and carries out its goals. Methods of infection include, but are not limited to, the following: Peer-to-peer networks (P2P)—This delivery mechanism has become very popular because of the increased … Read more

Spyware

Spyware is a type of malware that is designed to collect and forward information regarding a victim’s activities to an interested party. The defining characteristic is that the application acts behind the scenes to gather this information without the user’s consent or knowledge. The information gathered by spyware can be anything that the creator of … Read more

Using Public Computers

Public libraries, Internet cafes, and other customer-serving establishments have their own computers that customers may use to access the Internet. Are these computers safe for you to use? Tales abound of public-access computers infected with viruses, spyware, and even key loggers, many deliberately planted there in order to elicit information from unsuspecting users. I recall … Read more

Blocking Spyware

Spyware is a wide-reaching term that describes software used to monitor your Internet usage patterns, as well as software that can attempt to change your Internet browser configuration, or even record keystrokes (Virginia, the hackers want your bank account and other online passwords). Most spyware is not malicious in the same way that viruses are, … Read more