253:, Daniel Sundin, James Reno, Marc D’Souza, and Kristy Ross. The Complaint also listed Maurice D’Souza as a Relief Defendant, alleged that he held proceeds of wrongful conduct but not accusing him of violating any law. The FTC alleged that the other Defendants violated the FTC Act by deceptively marketing software, including WinFixer, WinAntivirus, DriveCleaner, ErrorSafe, and XP Antivirus. According to the complaint, the Defendants falsely represented that scans of a consumer's computer showed that it had been compromised or infected and then offered to sell software to fix the alleged problems.
173:), and claiming that some kind of spyware has infected the user's computer and that the scareware application will help to remove the infection. In some cases, scareware trojans have replaced the desktop of the victim with large, yellow text reading "Warning! You have spyware!" or a box containing similar text, and have even forced the screensaver to change to "bugs" crawling across the screen. Winwebsec is the term usually used to address the malware that attacks the users of Windows operating system and produces fake claims similar to that of genuine anti-malware software.
31:
1330:
241:
scareware. The lawsuit alleges that the company sent incessant pop-ups resembling system warnings to consumers' personal computers stating "CRITICAL ERROR MESSAGE! - REGISTRY DAMAGED AND CORRUPTED", before instructing users to visit a web site to download
Registry Cleaner XP at a cost of $ 39.95.
124:
Some scareware is not affiliated with any other installed programs. A user can encounter a pop-up on a website indicating that their PC is infected. In some scenarios, it is possible to become infected with scareware even if the user attempts to cancel the notification. These popups are specially
116:
Some websites display pop-up advertisement windows or banners with text such as: "Your computer may be infected with harmful spyware programs. Immediate removal may be required. To scan, click 'Yes' below." These websites can go as far as saying that a user's job, career, or marriage would be at
149:
Research by Google discovered that scareware was using some of its servers to check for internet connectivity. The data suggested that up to a million machines were infected with scareware. The company has placed a warning in the search results for users whose computers appear to be infected.
112:
software. This class of program tries to increase its perceived value by bombarding the user with constant warning messages that do not increase its effectiveness in any way. Software is packaged with a look and feel that mimics legitimate security software in order to deceive consumers.
925:
the
Washington attorney general (AG) has also brought lawsuits against companies such as Securelink Networks and High Falls Media, and the makers of a product called QuickShield, all of whom were accused of marketing their products using deceptive techniques such as fake alert
302:
folder. When this process is complete, a message is slowly typed on screen saying "Thank God this is only a game." A screen with the purchase information appears on screen and then returns to the desktop. No damage is done to the computer during the
199:. Since antivirus programs typically include protection against being tampered with or disabled by other software, scareware may use social engineering to convince the user to disable programs which would otherwise prevent the malware from working.
277:
computer (Fish #448) in 1991. When NightMare executes, it lies dormant for an extended and random period of time, finally changing the entire screen of the computer to an image of a skull while playing a horrifying shriek on the audio
104:
Internet security writers use the term "scareware" to describe software products that produce frivolous and alarming warnings or threat notices, most typically for fictitious or useless commercial
883:
93:, the number of scareware packages in circulation rose from 2,850 to 9,287 in the second half of 2008. In the first half of 2009, the APWG identified a 585% increase in scareware programs.
647:
153:
Another example of scareware is Smart
Fortress. This site scares the victim into thinking they have many viruses on their computer and asks them to buy a professional service.
565:
913:
846:
238:
316:
attacks with enhanced resilience. This approach targets the visual images presented to end users, which is a layer that attackers cannot easily obscure.
535:
875:
669:
219:) for $ 1 million over charges of using scareware pop-ups. Washington's attorney general has also brought lawsuits against Securelink Networks,
216:
824:
448:
261:
Another type of scareware involves software designed to literally scare the user through the use of unanticipated shocking images, sounds or video.
1142:
639:
1024:
1814:
1224:
594:
195:
Another approach is to trick users into uninstalling legitimate antivirus software, such as
Microsoft Security Essentials, or disabling their
752:
509:
249:("FTC") filed a Complaint in federal court against Innovative Marketing, Inc., ByteHosting Internet Services, LLC, as well as individuals
285:
saying "Erase everything on hard drive?" with two buttons, both labeled "OK". Regardless of which button is chosen, nothing is destroyed.
2425:
996:
730:
476:
180:
1197:
250:
1768:
281:
Anxiety-based scareware puts users in situations where there are no positive outcomes. For example, a small program can present a
1071:
803:
298:. When the file is run, a full screen representation of the desktop appears. The software then begins simulating deletion of the
179:
exemplifies spyware and scareware: it purports to remove spyware, but is actually a piece of spyware itself, often accompanying
2588:
2277:
946:
557:
419:
396:
1745:
1111:
132:
found 11,000 domains hosting fake anti-virus software, accounting for 50% of all malware delivered via internet advertising.
1117:
971:
709:
117:
risk. Products with advertisements such as these are often considered scareware. Serious scareware applications qualify as
96:
The "scareware" label can also apply to any application or virus which pranks users with intent to cause anxiety or panic.
1807:
1776:
1217:
771:
2542:
2233:
1708:
1050:
854:
1504:
2430:
1866:
1758:
905:
367:
2257:
1800:
2496:
1849:
1571:
1210:
1192:
531:
313:
165:
also qualify as scareware because they change the user's desktop background, install icons in the computer's
46:
677:
58:
440:
2097:
1763:
1684:
1484:
820:
90:
1017:
2578:
2516:
2165:
2045:
1740:
1698:
1354:
1187:
2573:
2384:
2160:
1886:
1601:
1319:
876:"Attorney General's Office Sues, Settles with Washington-based SoftwareOnline.com | Washington State"
1167:
625:
312:
Research in the 2020s has also introduced a new detection technology designed to identify scareware
2318:
2308:
2070:
1586:
1464:
1359:
587:
246:
125:
designed to look like they come from the user's operating system when they are actually a webpage.
2394:
2190:
1674:
1626:
1289:
501:
335:
82:
66:
2445:
2272:
2009:
1881:
2379:
992:
738:
469:
2226:
2029:
1871:
1823:
1715:
1449:
1154:
1092:
Seifert, Christian; Stokes, Jack W.; Colcernian, Christina; Platt, John C.; Lu, Long (2013).
612:
266:
50:
2552:
2547:
2506:
2435:
2293:
2120:
2004:
1994:
1876:
1859:
1735:
1647:
1596:
1541:
1409:
1382:
1364:
1262:
1233:
196:
105:
1329:
8:
2583:
2501:
2125:
2110:
1907:
1519:
1294:
1252:
237:
filed a lawsuit against two Texas firms, Branch
Software and Alpha Red, producers of the
2486:
2323:
2303:
2185:
2175:
2130:
1844:
1703:
1631:
1536:
1067:
800:
231:
220:
212:
2511:
2465:
2374:
2200:
2140:
2115:
1939:
1751:
1509:
1444:
1394:
1341:
1299:
1247:
1107:
967:
325:
299:
170:
166:
938:
416:
388:
2526:
2491:
2219:
2014:
1831:
1720:
1660:
1424:
1414:
1309:
1099:
234:
109:
85:
to remove it. Usually the virus is fictional and the software is non-functional or
2521:
2460:
2364:
2195:
2170:
2152:
2019:
1956:
1912:
1611:
1591:
1489:
1314:
1304:
1054:
807:
699:
423:
294:
1103:
2481:
2455:
2262:
1781:
1679:
1529:
1479:
1454:
1419:
1399:
1279:
1267:
1093:
118:
78:
1181:
2567:
2440:
2359:
2267:
2075:
1854:
1691:
1652:
1621:
1616:
1469:
1459:
1429:
143:
779:
2298:
1999:
1961:
1949:
1924:
1725:
1581:
1284:
850:
588:"The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution"
30:
1047:
2450:
2369:
2180:
2105:
2055:
1919:
1665:
1499:
1474:
1439:
1274:
561:
57:, or the perception of a threat in order to manipulate users into buying
1792:
2409:
2389:
2354:
2087:
2060:
2024:
1730:
1546:
1494:
1377:
1257:
1202:
330:
282:
176:
70:
2349:
2135:
1978:
1966:
1606:
1561:
1404:
1372:
1146:
359:
270:
227:
208:
136:
24:
1944:
1934:
1929:
1839:
1566:
1524:
1387:
704:
427:
340:
289:
184:
140:
77:
that tricks users into believing their computer is infected with a
74:
20:
2404:
2313:
2242:
2211:
2065:
2050:
1971:
1576:
1551:
1514:
585:
162:
86:
62:
54:
42:
183:
infections. Other antispyware scareware may be promoted using a
2344:
2339:
1902:
1434:
1349:
129:
558:"Air France Flight 447 Search Results Lead to Rogue Antivirus"
640:"Mass 'scareware' attack hits 1.5M websites, still spreading"
274:
1091:
1198:
Yes, that PC cleanup app you saw on TV at 3 a.m. is a waste
190:
288:
This tactic was used in an advertisement campaign by
670:"Malicious Web attack hits a million site addresses"
223:, High Falls Media, and the makers of Quick Shield.
502:"Scareware Mr Bigs enjoy 'low risk' crime bonanza"
135:Starting on March 29, 2011, more than 1.5 million
16:Malware designed to elicit fear, shock, or anxiety
700:"Google to Warn PC Virus Victims via Search Site"
2565:
844:
586:Moheeb Abu Rajab and Luca Ballard (2010-04-13).
470:"Phishing Activity Trends Report: 1st Half 2009"
81:, then suggests that they download and pay for
61:(or products). Scareware is part of a class of
2227:
1808:
1218:
906:"Microsoft to sue scareware security vendors"
215:successfully sued Secure Computer (makers of
529:
441:"Scareware scammers adopt cold call tactics"
993:"Wanted by the FBI - SHAILESHKUMAR P. JAIN"
555:
499:
139:around the world have been infected by the
2234:
2220:
1815:
1801:
1225:
1211:
847:"Washington and Microsoft target spammers"
1822:
1769:Security information and event management
769:
1232:
1143:"The Modern Rogue – Malware With a Face"
29:
2566:
2278:Timeline of computer viruses and worms
430:(2009-03-23). Retrieved on 2009-03-23.
2215:
1796:
1746:Host-based intrusion detection system
1206:
1140:
903:
1777:Runtime application self-protection
939:"Fighting the scourge of scareware"
763:
737:. February 29, 2012. Archived from
410:
191:Uninstallation of security software
13:
2241:
1328:
1134:
14:
2600:
2543:Computer and network surveillance
1709:Security-focused operating system
1175:
1057:. Amiga-stuff.com - see DISK 448.
650:from the original on July 8, 2012
417:'Scareware' scams trick searchers
389:"Millions tricked by 'scareware'"
265:An early program of this type is
256:
99:
1505:Insecure direct object reference
1095:Robust scareware image detection
1759:Information security management
1193:The Case of the Unusable System
1120:from the original on 2024-04-12
1085:
1074:from the original on 2018-07-24
1060:
1041:
1030:from the original on 2012-10-16
1010:
999:from the original on 2017-06-27
985:
974:from the original on 2013-09-19
960:
949:from the original on 2018-02-12
931:
916:from the original on 2010-06-20
897:
886:from the original on 2021-12-08
868:
845:Etengoff, Aharon (2008-09-29).
838:
827:from the original on 2017-08-10
813:
794:
745:
735:Kaspersky Lab Technical Support
723:
712:from the original on 2016-07-21
692:
676:. April 1, 2011. Archived from
662:
632:
600:from the original on 2019-02-20
568:from the original on 2012-02-17
538:from the original on 2017-04-10
512:from the original on 2017-08-10
482:from the original on 2012-04-15
451:from the original on 2018-02-10
399:from the original on 2018-06-22
370:from the original on 2023-12-07
269:, a program distributed on the
202:
34:An example of a scareware popup
2258:Comparison of computer viruses
772:"Scareware in SpyWareLoop.com"
579:
549:
523:
493:
462:
433:
381:
352:
245:On December 2, 2008, the U.S.
1:
2589:Social engineering (security)
2497:Data loss prevention software
1141:O’Dea, Hamish (2009-10-16).
1023:. Federal Trade Commission.
970:. Federal Trade Commission.
307:
146:attack spread by scareware.
7:
2098:Software release life cycle
1764:Information risk management
1685:Multi-factor authentication
1241:Related security categories
1104:10.1109/ICASSP.2013.6638192
810:filed under "Brave Sentry."
530:Carine Febre (2014-10-20).
319:
91:Anti-Phishing Working Group
10:
2605:
2517:Intrusion detection system
2166:Software protection dongle
2046:Unwanted software bundling
1741:Intrusion detection system
1699:Computer security software
1355:Advanced persistent threat
1183:Demonstration of scareware
770:Vincentas (11 July 2013).
556:JM Hipolito (2009-06-04).
500:John Leydon (2009-10-20).
156:
18:
2535:
2474:
2418:
2385:Privacy-invasive software
2332:
2286:
2250:
2161:Digital rights management
2151:
2096:
2038:
1987:
1895:
1830:
1640:
1340:
1326:
1320:Digital rights management
1240:
89:itself. According to the
2039:Deceptive and/or illicit
1465:Denial-of-service attack
1360:Arbitrary code execution
360:"What is Malware? | IBM"
346:
247:Federal Trade Commission
19:Not to be confused with
2395:Rogue security software
2191:Software license server
1675:Computer access control
1627:Rogue security software
1290:Electromagnetic warfare
336:Rogue security software
83:fake antivirus software
67:rogue security software
2431:Classic Mac OS viruses
2273:List of computer worms
1867:Freely redistributable
1721:Obfuscation (software)
1450:Browser Helper Objects
1334:
1162:Cite journal requires
1098:. pp. 2920–2924.
620:Cite journal requires
532:"Fake Warning Example"
35:
2030:Software as a service
1824:Software distribution
1716:Data-centric security
1597:Remote access trojans
1332:
1048:Contents of disk #448
1018:"D'Souza Final Order"
731:"Smart Fortress 2012"
292:in 1997 to advertise
33:
2553:Operation: Bot Roast
2121:Software maintenance
1995:Digital distribution
1850:Free and open-source
1648:Application security
1542:Privilege escalation
1410:Cross-site scripting
1263:Cybersex trafficking
1234:Information security
904:Tarun (2008-09-29).
753:"bugs on the screen"
680:on November 11, 2014
2502:Defensive computing
2419:By operating system
2126:Software maintainer
1908:Commercial software
1896:Compensation models
1295:Information warfare
1253:Automotive security
821:"theregister.co.uk"
239:Registry Cleaner XP
2487:Antivirus software
2333:Malware for profit
2304:Man-in-the-browser
2251:Infectious malware
2186:Software copyright
2176:Product activation
2131:Software publisher
1845:Floating licensing
1704:Antivirus software
1572:Social engineering
1537:Polymorphic engine
1490:Fraudulent dialers
1395:Hardware backdoors
1335:
1068:"Dark Drive Prank"
1053:2018-09-18 at the
806:2018-09-22 at the
801:spywarewarrior.com
782:on 8 November 2014
422:2017-08-10 at the
314:social engineering
221:Softwareonline.com
63:malicious software
47:social engineering
36:
2579:False advertising
2561:
2560:
2512:Internet security
2466:HyperCard viruses
2375:Keystroke logging
2365:Fraudulent dialer
2309:Man-in-the-middle
2209:
2208:
2201:Torrent poisoning
2116:Long-term support
1940:Pay what you want
1790:
1789:
1752:Anomaly detection
1657:Secure by default
1510:Keystroke loggers
1445:Drive-by download
1333:vectorial version
1300:Internet security
1248:Computer security
1113:978-1-4799-0356-6
757:Microsoft TechNet
646:. April 1, 2011.
326:Computer security
226:In October 2008,
171:Microsoft Windows
167:notification area
59:unwanted software
2596:
2574:Types of malware
2527:Network security
2492:Browser security
2236:
2229:
2222:
2213:
2212:
2015:Product bundling
1988:Delivery methods
1887:Source-available
1817:
1810:
1803:
1794:
1793:
1661:Secure by design
1592:Hardware Trojans
1425:History sniffing
1415:Cross-site leaks
1310:Network security
1227:
1220:
1213:
1204:
1203:
1184:
1171:
1165:
1160:
1158:
1150:
1129:
1128:
1126:
1125:
1089:
1083:
1082:
1080:
1079:
1064:
1058:
1045:
1039:
1038:
1036:
1035:
1029:
1022:
1014:
1008:
1007:
1005:
1004:
989:
983:
982:
980:
979:
964:
958:
957:
955:
954:
935:
929:
928:
922:
921:
901:
895:
894:
892:
891:
872:
866:
865:
863:
862:
853:. Archived from
842:
836:
835:
833:
832:
817:
811:
798:
792:
791:
789:
787:
778:. Archived from
767:
761:
760:
749:
743:
742:
727:
721:
720:
718:
717:
696:
690:
689:
687:
685:
666:
660:
659:
657:
655:
636:
630:
629:
623:
618:
616:
608:
606:
605:
599:
592:
583:
577:
576:
574:
573:
553:
547:
546:
544:
543:
534:. Carine Febre.
527:
521:
520:
518:
517:
497:
491:
490:
488:
487:
481:
474:
466:
460:
459:
457:
456:
437:
431:
414:
408:
407:
405:
404:
385:
379:
378:
376:
375:
356:
235:attorney general
213:Washington state
128:A 2010 study by
110:registry cleaner
2604:
2603:
2599:
2598:
2597:
2595:
2594:
2593:
2564:
2563:
2562:
2557:
2536:Countermeasures
2531:
2522:Mobile security
2470:
2461:Palm OS viruses
2426:Android malware
2414:
2328:
2324:Zombie computer
2282:
2246:
2240:
2210:
2205:
2196:Software patent
2171:License manager
2153:Copy protection
2147:
2092:
2034:
2020:Retail software
1983:
1957:Open-core model
1913:Retail software
1891:
1826:
1821:
1791:
1786:
1636:
1336:
1324:
1315:Copy protection
1305:Mobile security
1236:
1231:
1182:
1178:
1163:
1161:
1152:
1151:
1137:
1135:Further reading
1132:
1123:
1121:
1114:
1090:
1086:
1077:
1075:
1066:
1065:
1061:
1055:Wayback Machine
1046:
1042:
1033:
1031:
1027:
1020:
1016:
1015:
1011:
1002:
1000:
991:
990:
986:
977:
975:
966:
965:
961:
952:
950:
937:
936:
932:
919:
917:
902:
898:
889:
887:
874:
873:
869:
860:
858:
843:
839:
830:
828:
819:
818:
814:
808:Wayback Machine
799:
795:
785:
783:
768:
764:
751:
750:
746:
729:
728:
724:
715:
713:
698:
697:
693:
683:
681:
668:
667:
663:
653:
651:
638:
637:
633:
621:
619:
610:
609:
603:
601:
597:
590:
584:
580:
571:
569:
554:
550:
541:
539:
528:
524:
515:
513:
498:
494:
485:
483:
479:
472:
468:
467:
463:
454:
452:
439:
438:
434:
424:Wayback Machine
415:
411:
402:
400:
387:
386:
382:
373:
371:
358:
357:
353:
349:
322:
310:
295:Virus: The Game
259:
217:Spyware Cleaner
205:
193:
159:
102:
73:and other scam
28:
17:
12:
11:
5:
2602:
2592:
2591:
2586:
2581:
2576:
2559:
2558:
2556:
2555:
2550:
2545:
2539:
2537:
2533:
2532:
2530:
2529:
2524:
2519:
2514:
2509:
2504:
2499:
2494:
2489:
2484:
2482:Anti-keylogger
2478:
2476:
2472:
2471:
2469:
2468:
2463:
2458:
2456:Mobile malware
2453:
2448:
2443:
2438:
2433:
2428:
2422:
2420:
2416:
2415:
2413:
2412:
2407:
2402:
2397:
2392:
2387:
2382:
2377:
2372:
2367:
2362:
2357:
2352:
2347:
2342:
2336:
2334:
2330:
2329:
2327:
2326:
2321:
2316:
2311:
2306:
2301:
2296:
2290:
2288:
2284:
2283:
2281:
2280:
2275:
2270:
2265:
2263:Computer virus
2260:
2254:
2252:
2248:
2247:
2239:
2238:
2231:
2224:
2216:
2207:
2206:
2204:
2203:
2198:
2193:
2188:
2183:
2178:
2173:
2168:
2163:
2157:
2155:
2149:
2148:
2146:
2145:
2144:
2143:
2133:
2128:
2123:
2118:
2113:
2108:
2102:
2100:
2094:
2093:
2091:
2090:
2085:
2080:
2079:
2078:
2073:
2068:
2063:
2058:
2048:
2042:
2040:
2036:
2035:
2033:
2032:
2027:
2022:
2017:
2012:
2007:
2002:
1997:
1991:
1989:
1985:
1984:
1982:
1981:
1976:
1975:
1974:
1964:
1959:
1954:
1953:
1952:
1947:
1937:
1932:
1927:
1922:
1917:
1916:
1915:
1905:
1899:
1897:
1893:
1892:
1890:
1889:
1884:
1879:
1874:
1869:
1864:
1863:
1862:
1857:
1847:
1842:
1836:
1834:
1828:
1827:
1820:
1819:
1812:
1805:
1797:
1788:
1787:
1785:
1784:
1782:Site isolation
1779:
1774:
1773:
1772:
1766:
1756:
1755:
1754:
1749:
1738:
1733:
1728:
1723:
1718:
1713:
1712:
1711:
1706:
1696:
1695:
1694:
1689:
1688:
1687:
1680:Authentication
1672:
1671:
1670:
1669:
1668:
1658:
1655:
1644:
1642:
1638:
1637:
1635:
1634:
1629:
1624:
1619:
1614:
1609:
1604:
1599:
1594:
1589:
1584:
1579:
1574:
1569:
1564:
1559:
1554:
1549:
1544:
1539:
1534:
1533:
1532:
1522:
1517:
1512:
1507:
1502:
1497:
1492:
1487:
1482:
1480:Email spoofing
1477:
1472:
1467:
1462:
1457:
1452:
1447:
1442:
1437:
1432:
1427:
1422:
1420:DOM clobbering
1417:
1412:
1407:
1402:
1400:Code injection
1397:
1392:
1391:
1390:
1385:
1380:
1375:
1367:
1362:
1357:
1352:
1346:
1344:
1338:
1337:
1327:
1325:
1323:
1322:
1317:
1312:
1307:
1302:
1297:
1292:
1287:
1282:
1280:Cyberterrorism
1277:
1272:
1271:
1270:
1268:Computer fraud
1265:
1255:
1250:
1244:
1242:
1238:
1237:
1230:
1229:
1222:
1215:
1207:
1201:
1200:
1195:
1190:
1177:
1176:External links
1174:
1173:
1172:
1164:|journal=
1136:
1133:
1131:
1130:
1112:
1084:
1059:
1040:
1009:
984:
968:"Win software"
959:
945:. 2008-10-01.
930:
896:
880:www.atg.wa.gov
867:
837:
812:
793:
762:
744:
741:on 2017-01-28.
722:
708:. 2011-07-21.
691:
661:
631:
622:|journal=
578:
548:
522:
492:
461:
447:. 2009-04-10.
432:
409:
395:. 2009-10-19.
380:
350:
348:
345:
344:
343:
338:
333:
328:
321:
318:
309:
306:
305:
304:
303:advertisement.
286:
279:
258:
257:Prank software
255:
204:
201:
192:
189:
161:Some forms of
158:
155:
119:rogue software
101:
100:Scam scareware
98:
65:that includes
15:
9:
6:
4:
3:
2:
2601:
2590:
2587:
2585:
2582:
2580:
2577:
2575:
2572:
2571:
2569:
2554:
2551:
2549:
2546:
2544:
2541:
2540:
2538:
2534:
2528:
2525:
2523:
2520:
2518:
2515:
2513:
2510:
2508:
2505:
2503:
2500:
2498:
2495:
2493:
2490:
2488:
2485:
2483:
2480:
2479:
2477:
2473:
2467:
2464:
2462:
2459:
2457:
2454:
2452:
2449:
2447:
2446:MacOS malware
2444:
2442:
2441:Linux malware
2439:
2437:
2434:
2432:
2429:
2427:
2424:
2423:
2421:
2417:
2411:
2408:
2406:
2403:
2401:
2398:
2396:
2393:
2391:
2388:
2386:
2383:
2381:
2378:
2376:
2373:
2371:
2368:
2366:
2363:
2361:
2360:Form grabbing
2358:
2356:
2353:
2351:
2348:
2346:
2343:
2341:
2338:
2337:
2335:
2331:
2325:
2322:
2320:
2317:
2315:
2312:
2310:
2307:
2305:
2302:
2300:
2297:
2295:
2292:
2291:
2289:
2285:
2279:
2276:
2274:
2271:
2269:
2268:Computer worm
2266:
2264:
2261:
2259:
2256:
2255:
2253:
2249:
2244:
2237:
2232:
2230:
2225:
2223:
2218:
2217:
2214:
2202:
2199:
2197:
2194:
2192:
2189:
2187:
2184:
2182:
2179:
2177:
2174:
2172:
2169:
2167:
2164:
2162:
2159:
2158:
2156:
2154:
2150:
2142:
2139:
2138:
2137:
2134:
2132:
2129:
2127:
2124:
2122:
2119:
2117:
2114:
2112:
2109:
2107:
2104:
2103:
2101:
2099:
2095:
2089:
2086:
2084:
2081:
2077:
2074:
2072:
2069:
2067:
2064:
2062:
2059:
2057:
2054:
2053:
2052:
2049:
2047:
2044:
2043:
2041:
2037:
2031:
2028:
2026:
2023:
2021:
2018:
2016:
2013:
2011:
2010:Pre-installed
2008:
2006:
2003:
2001:
1998:
1996:
1993:
1992:
1990:
1986:
1980:
1977:
1973:
1970:
1969:
1968:
1965:
1963:
1960:
1958:
1955:
1951:
1948:
1946:
1943:
1942:
1941:
1938:
1936:
1933:
1931:
1928:
1926:
1923:
1921:
1918:
1914:
1911:
1910:
1909:
1906:
1904:
1901:
1900:
1898:
1894:
1888:
1885:
1883:
1882:Public domain
1880:
1878:
1875:
1873:
1870:
1868:
1865:
1861:
1858:
1856:
1853:
1852:
1851:
1848:
1846:
1843:
1841:
1838:
1837:
1835:
1833:
1829:
1825:
1818:
1813:
1811:
1806:
1804:
1799:
1798:
1795:
1783:
1780:
1778:
1775:
1770:
1767:
1765:
1762:
1761:
1760:
1757:
1753:
1750:
1747:
1744:
1743:
1742:
1739:
1737:
1734:
1732:
1729:
1727:
1724:
1722:
1719:
1717:
1714:
1710:
1707:
1705:
1702:
1701:
1700:
1697:
1693:
1692:Authorization
1690:
1686:
1683:
1682:
1681:
1678:
1677:
1676:
1673:
1667:
1664:
1663:
1662:
1659:
1656:
1654:
1653:Secure coding
1651:
1650:
1649:
1646:
1645:
1643:
1639:
1633:
1630:
1628:
1625:
1623:
1622:SQL injection
1620:
1618:
1615:
1613:
1610:
1608:
1605:
1603:
1602:Vulnerability
1600:
1598:
1595:
1593:
1590:
1588:
1587:Trojan horses
1585:
1583:
1582:Software bugs
1580:
1578:
1575:
1573:
1570:
1568:
1565:
1563:
1560:
1558:
1555:
1553:
1550:
1548:
1545:
1543:
1540:
1538:
1535:
1531:
1528:
1527:
1526:
1523:
1521:
1518:
1516:
1513:
1511:
1508:
1506:
1503:
1501:
1498:
1496:
1493:
1491:
1488:
1486:
1483:
1481:
1478:
1476:
1473:
1471:
1470:Eavesdropping
1468:
1466:
1463:
1461:
1460:Data scraping
1458:
1456:
1453:
1451:
1448:
1446:
1443:
1441:
1438:
1436:
1433:
1431:
1430:Cryptojacking
1428:
1426:
1423:
1421:
1418:
1416:
1413:
1411:
1408:
1406:
1403:
1401:
1398:
1396:
1393:
1389:
1386:
1384:
1381:
1379:
1376:
1374:
1371:
1370:
1368:
1366:
1363:
1361:
1358:
1356:
1353:
1351:
1348:
1347:
1345:
1343:
1339:
1331:
1321:
1318:
1316:
1313:
1311:
1308:
1306:
1303:
1301:
1298:
1296:
1293:
1291:
1288:
1286:
1283:
1281:
1278:
1276:
1273:
1269:
1266:
1264:
1261:
1260:
1259:
1256:
1254:
1251:
1249:
1246:
1245:
1243:
1239:
1235:
1228:
1223:
1221:
1216:
1214:
1209:
1208:
1205:
1199:
1196:
1194:
1191:
1189:
1185:
1180:
1179:
1169:
1156:
1148:
1145:. Australia:
1144:
1139:
1138:
1119:
1115:
1109:
1105:
1101:
1097:
1096:
1088:
1073:
1069:
1063:
1056:
1052:
1049:
1044:
1026:
1019:
1013:
998:
994:
988:
973:
969:
963:
948:
944:
940:
934:
927:
915:
911:
907:
900:
885:
881:
877:
871:
857:on 2008-10-02
856:
852:
848:
841:
826:
822:
816:
809:
805:
802:
797:
781:
777:
773:
766:
758:
754:
748:
740:
736:
732:
726:
711:
707:
706:
701:
695:
679:
675:
671:
665:
649:
645:
641:
635:
627:
614:
596:
589:
582:
567:
563:
559:
552:
537:
533:
526:
511:
507:
503:
496:
478:
471:
465:
450:
446:
442:
436:
429:
425:
421:
418:
413:
398:
394:
390:
384:
369:
365:
361:
355:
351:
342:
339:
337:
334:
332:
329:
327:
324:
323:
317:
315:
301:
297:
296:
291:
287:
284:
280:
276:
272:
268:
264:
263:
262:
254:
252:
248:
243:
240:
236:
233:
229:
224:
222:
218:
214:
210:
200:
198:
188:
186:
182:
178:
174:
172:
168:
164:
154:
151:
147:
145:
144:SQL injection
142:
138:
133:
131:
126:
122:
120:
114:
111:
107:
97:
94:
92:
88:
84:
80:
76:
72:
68:
64:
60:
56:
52:
48:
44:
41:is a form of
40:
32:
26:
22:
2399:
2319:Trojan horse
2299:Clickjacking
2082:
2071:Trojan horse
2000:File sharing
1962:Postcardware
1950:Donationware
1925:Crowdfunding
1872:License-free
1726:Data masking
1556:
1285:Cyberwarfare
1155:cite journal
1122:. Retrieved
1094:
1087:
1076:. Retrieved
1062:
1043:
1032:. Retrieved
1012:
1001:. Retrieved
987:
976:. Retrieved
962:
951:. Retrieved
942:
933:
924:
918:. Retrieved
909:
899:
888:. Retrieved
879:
870:
859:. Retrieved
855:the original
851:The Inquirer
840:
829:. Retrieved
815:
796:
784:. Retrieved
780:the original
776:Spyware Loop
775:
765:
756:
747:
739:the original
734:
725:
714:. Retrieved
703:
694:
682:. Retrieved
678:the original
673:
664:
652:. Retrieved
643:
634:
613:cite journal
602:. Retrieved
581:
570:. Retrieved
551:
540:. Retrieved
525:
514:. Retrieved
506:The Register
505:
495:
484:. Retrieved
464:
453:. Retrieved
445:The Register
444:
435:
412:
401:. Retrieved
392:
383:
372:. Retrieved
363:
354:
311:
293:
260:
244:
225:
206:
203:Legal action
194:
175:
160:
152:
148:
134:
127:
123:
115:
103:
95:
38:
37:
2451:Macro virus
2436:iOS malware
2410:Web threats
2370:Infostealer
2287:Concealment
2181:Product key
2111:End-of-life
2106:Abandonware
2056:Infostealer
2005:On-premises
1920:Crippleware
1877:Proprietary
1860:Open source
1666:Misuse case
1500:Infostealer
1475:Email fraud
1440:Data breach
1275:Cybergeddon
674:Reuters.com
644:On Deadline
562:Trend Micro
364:www.ibm.com
45:which uses
2584:Cybercrime
2568:Categories
2475:Protection
2390:Ransomware
2355:Fleeceware
2088:Shovelware
2061:Ransomware
2025:Sneakernet
1731:Encryption
1607:Web shells
1547:Ransomware
1495:Hacktivism
1258:Cybercrime
1124:2024-02-09
1078:2010-02-18
1034:2012-03-15
1003:2016-07-28
978:2012-03-15
953:2008-10-02
920:2009-09-24
890:2021-12-21
861:2008-10-04
831:2017-08-10
716:2011-07-22
604:2010-11-18
572:2009-06-06
542:2014-11-21
516:2009-10-21
486:2009-10-05
455:2009-04-12
403:2009-10-20
374:2023-12-06
331:Ransomware
283:dialog box
271:Fish Disks
232:Washington
177:SpySheriff
71:ransomware
2400:Scareware
2350:Crimeware
2136:Vaporware
2083:Scareware
1979:Trialware
1967:Shareware
1562:Shellcode
1557:Scareware
1405:Crimeware
1365:Backdoors
1147:Microsoft
926:messages.
910:Lunarsoft
308:Detection
278:channels.
267:NightMare
228:Microsoft
209:Microsoft
207:In 2005,
181:SmitFraud
137:web sites
49:to cause
39:Scareware
25:Shareware
2548:Honeypot
2507:Firewall
2294:Backdoor
1945:Careware
1935:Freeware
1930:Freemium
1840:Beerware
1832:Licenses
1736:Firewall
1641:Defenses
1567:Spamming
1552:Rootkits
1525:Phishing
1485:Exploits
1118:Archived
1072:Archived
1051:Archived
1025:Archived
997:Archived
972:Archived
947:Archived
943:BBC News
914:Archived
884:Archived
825:Archived
804:Archived
710:Archived
705:BBC News
654:April 2,
648:Archived
595:Archived
566:Archived
536:Archived
510:Archived
477:Archived
449:Archived
428:BBC News
420:Archived
397:Archived
393:BBC News
368:Archived
341:Tapsnake
320:See also
290:Sir-Tech
273:for the
251:Sam Jain
230:and the
197:firewall
185:phishing
141:LizaMoon
106:firewall
75:software
21:Careware
2405:Spyware
2314:Rootkit
2243:Malware
2066:Spyware
2051:Malware
1972:Nagware
1577:Spyware
1520:Payload
1515:Malware
1455:Viruses
1435:Botnets
1342:Threats
1188:YouTube
995:. FBI.
786:27 July
684:July 1,
300:Windows
169:(under
163:spyware
157:Spyware
87:malware
55:anxiety
43:malware
2380:Malbot
2345:Botnet
2340:Adware
2245:topics
1903:Adware
1771:(SIEM)
1748:(HIDS)
1632:Zombie
1369:Bombs
1350:Adware
1110:
187:scam.
130:Google
1617:Worms
1612:Wiper
1530:Voice
1378:Logic
1028:(PDF)
1021:(PDF)
598:(PDF)
591:(PDF)
480:(PDF)
473:(PDF)
347:Notes
275:Amiga
79:virus
51:shock
2141:list
2076:Worm
1855:Free
1383:Time
1373:Fork
1168:help
1108:ISBN
788:2013
686:2017
656:2011
626:help
211:and
108:and
1388:Zip
1186:on
1100:doi
23:or
2570::
1159::
1157:}}
1153:{{
1116:.
1106:.
1070:.
941:.
923:.
912:.
908:.
882:.
878:.
849:.
823:.
774:.
755:.
733:.
702:.
672:.
642:.
617::
615:}}
611:{{
593:.
564:.
560:.
508:.
504:.
475:.
443:.
426:.
391:.
366:.
362:.
121:.
69:,
53:,
2235:e
2228:t
2221:v
1816:e
1809:t
1802:v
1226:e
1219:t
1212:v
1170:)
1166:(
1149:.
1127:.
1102::
1081:.
1037:.
1006:.
981:.
956:.
893:.
864:.
834:.
790:.
759:.
719:.
688:.
658:.
628:)
624:(
607:.
575:.
545:.
519:.
489:.
458:.
406:.
377:.
27:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.