Talk With an Expert

Spyware - Identification and Defense

Spyware - Identification and Defense (PDF, 2.01MB)Published: 14 Dec, 2001
Created by
Lewis Edge

You are being watched while surfing around the Internet. You may not realize it at the time but information about the websites you visit, products you purchase and even the advertising hyperlinks you follow are being collected and transmitted back to a server. This information is sold to whomever wants it. This is a general type of information that is not linked directly to you. Now, suppose you found a program you want to download, which you do. The installation completes and you reboot the system. You use the program until you find a software package that is more functional or you become bored with it. In any case you uninstall the program, or so you think. Without your knowledge or consent, this program has been transmitting personal data, i.e. bank account or credit card information, even personal medical history back to the developer. The software may have even left an open port, a door; to your computer allowing the perpetrator to enter your system to pick and choose the information he wants. Imagine the implications of this type of information theft. This is a prime example of a spyware infection.