SBN

Malware: What is spyware?

Introduction 

Many things in life come with their downsides, and unfortunately, the internet is one of them. Spyware is an unavoidable (without proper measures) thorn for those traversing the web and can ruin your cyber life faster than you can receive that shopping order you placed online (from the same site that infected you). 

This article will detail what spyware is, different spyware types, what spyware can do to your system and some tips on how to prevent this malignant threat.

What is spyware?

Spyware is malicious software that clandestinely collects and shares computer and network info. This collected information is then shared with the software’s creator, cybercriminals, unscrupulous advertisers and marketers and anyone else who may find that information valuable. Spyware can be installed via the usual suspects of malware including websites, email and ads lying in wait for unsuspecting victims, but also via removable drives and installing freeware/shareware. 

The information collected from computers includes names, addresses, bank account information, Social Security Numbers, passwords and more. A critical aspect of spyware is being able to send this information back to its creator or cybercriminals, making having a connection to the internet pivotal. 

What can spyware do?

There are a couple things to remember with spyware. First, the “spy” in spyware is not referring to James Bond, but rather more like someone spying right over your shoulder as you enter information into a computer. This means they can see all of your private information, not to mention your login credentials and other information you would never want divulged to the world.

The second thing is to keep in mind that the intended target for spyware is not a physical computer (unlike ransomware) but is YOU. All of your sensitive information is valuable to cybercriminals and others on (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/WZENBv1kF-s/