1728:" to make them stop infecting consumers' PCs with spyware. In one case, that against Seismic Entertainment Productions, the FTC accused the defendants of developing a program that seized control of PCs nationwide, infected them with spyware and other malicious software, bombarded them with a barrage of pop-up advertising for Seismic's clients, exposed the PCs to security risks, and caused them to malfunction. Seismic then offered to sell the victims an "antispyware" program to fix the computers, and stop the popups and other problems that Seismic had caused. On November 21, 2006, a settlement was entered in federal court under which a $ 1.75 million judgment was imposed in one case and $ 1.86 million in another, but the defendants were insolvent
853:, spy gadgets that look like normal devices but turn out to be something else, such as a USB Keylogger. These devices actually are connected to the device as memory units but are capable of recording each stroke made on the keyboard. Some spyware authors infect a system through security holes in the Web browser or in other software. When the user navigates to a Web page controlled by the spyware author, the page contains code which attacks the browser and forces the download and installation of spyware.
1168:, and remove files and entries which match a list of known spyware. Real-time protection from spyware works identically to real-time anti-virus protection: the software scans disk files at download time, and blocks the activity of components known to represent spyware. In some cases, it may also intercept attempts to install start-up items or to modify browser settings. Earlier versions of anti-spyware programs focused chiefly on detection and removal. Javacool Software's
3848:
885:
1866:), so most students mistakenly believed their webcams did not work at all. On top of the webcam surveillance, TheftTrack allowed school officials to take screenshots and send them to the school's server. School officials were also granted the ability to take snapshots of instant messages, web browsing, music playlists, and written compositions. The schools admitted to secretly snapping over 66,000 webshots and
1187:, which scans certain areas of the Windows OS where spyware often resides and presents a list with items to delete manually. As most of the items are legitimate windows files/registry entries it is advised for those who are less knowledgeable on this subject to post a HijackThis log on the numerous antispyware sites and let the experts decide what to delete.
1850:'s remote activation tracking software. This included the now-discontinued "TheftTrack". While TheftTrack was not enabled by default on the software, the program allowed the school district to elect to activate it, and to choose which of the TheftTrack surveillance options the school wanted to enable.
1646:
reading would suggest that the promulgation of spyware would count as a criminal act. Law enforcement has often pursued the authors of other malware, particularly viruses. However, few spyware developers have been prosecuted, and many operate openly as strictly legitimate businesses, though some have
1179:
Like most anti-virus software, many anti-spyware/adware tools require a frequently updated database of threats. As new spyware programs are released, anti-spyware developers discover and evaluate them, adding to the list of known spyware, which allows the software to detect and remove new spyware. As
1853:
TheftTrack allowed school district employees to secretly remotely activate the webcam embedded in the student's laptop, above the laptop's screen. That allowed school officials to secretly take photos through the webcam, of whatever was in front of it and in its line of sight, and send the photos to
1845:
case, plaintiffs charged two suburban
Philadelphia high schools secretly spied on students by surreptitiously and remotely activating webcams embedded in school-issued laptops the students were using at home, and therefore infringed on their privacy rights. The school loaded each student's computer
1190:
If a spyware program is not blocked and manages to get itself installed, it may resist attempts to terminate or uninstall it. Some programs work in pairs: when an anti-spyware scanner (or the user) terminates one running process, the other one respawns the killed program. Likewise, some spyware will
626:
and the
National Cyber-Security Alliance, 61 percent of surveyed users' computers were infected with some form of spyware. 92 percent of surveyed users with spyware reported that they did not know of its presence, and 91 percent reported that they had not given permission for the installation of the
1748:
An administrative fine, the first of its kind in Europe, has been issued by the
Independent Authority of Posts and Telecommunications (OPTA) from the Netherlands. It applied fines in total value of Euro 1,000,000 for infecting 22 million computers. The spyware concerned is called DollarRevenue. The
1469:
These common spyware programs illustrate the diversity of behaviors found in these attacks. Note that as with computer viruses, researchers give names to spyware programs which may not be used by their creators. Programs may be grouped into "families" based not on shared program code, but on common
1451:" is a type of spyware that is not hidden from the user, but operates with their knowledge, if not necessarily their consent. Parents, religious leaders or other authority figures may require their children or congregation members to install such software, which is intended to detect the viewing of
1426:
is spyware that has been used to monitor electronic activities of partners in intimate relationships. At least one software package, Loverspy, was specifically marketed for this purpose. Depending on local laws regarding communal/marital property, observing a partner's online activity without their
1410:
Notifications application was installed on most
Windows PCs as a "critical security update". While the main purpose of this deliberately uninstallable application is to ensure the copy of Windows on the machine was lawfully purchased and installed, it also installs software that has been accused of
1735:
charged that CyberSpy marketed and sold "RemoteSpy" keylogger spyware to clients who would then secretly monitor unsuspecting consumers' computers. According to the FTC, Cyberspy touted RemoteSpy as a "100% undetectable" way to "Spy on Anyone. From
Anywhere." The FTC has obtained a temporary order
1116:
have also added anti-spyware features to their existing anti-virus products. Early on, anti-virus firms expressed reluctance to add anti-spyware functions, citing lawsuits brought by spyware authors against the authors of web sites and programs which described their products as "spyware". However,
1317:
places the spyware operator's affiliate tag on the user's activity – replacing any other tag, if there is one. The spyware operator is the only party that gains from this. The user has their choices thwarted, a legitimate affiliate loses revenue, networks' reputations are injured, and vendors are
980:
are sometimes part of malware packages downloaded onto computers without the owners' knowledge. Some keylogger software is freely available on the internet, while others are commercial or private applications. Most keyloggers allow not only keyboard keystrokes to be captured, they also are often
1822:
for describing its program as "spyware". PC Pitstop settled, agreeing not to use the word "spyware", but continues to describe harm caused by the Gator/Claria software. As a result, other anti-spyware and anti-virus companies have also used other terms such as "potentially unwanted programs" or
946:
activity, disk usage, and network traffic. Stability issues, such as applications freezing, failure to boot, and system-wide crashes are also common. Usually, this effect is intentional, but may be caused from the malware simply requiring large amounts of computing power, disk space, or network
723:
Spyware is mostly used for the stealing information and storing
Internet users' movements on the Web and serving up pop-up ads to Internet users. Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such as
1527:
The recent proliferation of fake or spoofed antivirus products that bill themselves as antispyware can be troublesome. Users may receive popups prompting them to install them to protect their computer, when it will in fact add spyware. It is recommended that users do not install any freeware
1266:
Individual users can use cellphone / computer with physical (electric) switch, or isolated electronic switch that disconnects microphone, camera without bypass and keep it in disconnected position where not in use, that limits information that spyware can collect. (Policy recommended by NIST
3184:
Also known as WinAntiVirusPro, ErrorSafe, SystemDoctor, WinAntiSpyware, AVSystemCare, WinAntiSpy, Windows Police Pro, Performance
Optimizer, StorageProtector, PrivacyProtector, WinReanimator, DriveCleaner, WinspywareProtect, PCTurboPro, FreePCSecure, ErrorProtector, SysProtect, WinSoftware,
683:
that allows execution. Once running, the spyware will periodically check if any of these links are removed. If so, they will be automatically restored. This ensures that the spyware will execute when the operating system is booted, even if some (or most) of the registry links are removed.
808:, which is linked to their identity, far beyond users' visits and activity on the Facebook site itself. The report stated: "Here's how it works. You go to Facebook, you log in, you spend some time there, and then ... you move on without logging out. Let's say the next site you go to is
1365:
estimates that 27.3 million
Americans have been victims of identity theft, and that financial losses from identity theft totaled nearly $ 48 billion for businesses and financial institutions and at least $ 5 billion in out-of-pocket expenses for individuals.
786:
Use of the term "spyware" has eventually declined as the practice of tracking users has been pushed ever further into the mainstream by major websites and data mining companies; these generally break no known laws and compel users to be tracked, not by fraudulent practices
1439:, the small text files that track browsing activity, as spyware. While they are not always inherently malicious, many users object to third parties using space on their personal computers for their business purposes, and many anti-spyware programs offer to remove them.
1736:
prohibiting the defendants from selling the software and disconnecting from the
Internet any of their servers that collect, store, or provide access to information that this software has gathered. The case is still in its preliminary stages. A complaint filed by the
3465:"Besluit van het college van de Onafhankelijke Post en Telecommunicatie Autoriteit op grond van artikel 15.4 juncto artikel 15.10 van de Telecommunicatiewet tot oplegging van boetes ter zake van overtredingen van het gestelde bij of krachtens de Telecommunicatiewet"
779:, literally "Government Trojan"). Govware is typically a trojan horse software used to intercept communications from the target computer. Some countries, like Switzerland and Germany, have a legal framework governing the use of such software. In the US, the term "
678:
contains multiple sections where modification of key values allows software to be executed automatically when the operating system boots. Spyware can exploit this design to circumvent attempts at removal. The spyware typically links itself to each location in the
1696:, have passed laws criminalizing some forms of spyware. Such laws make it illegal for anyone other than the owner or operator of a computer to install software that alters Web-browser settings, monitors keystrokes, or disables computer-security software.
1117:
recent versions of these major firms home and business anti-virus products do include anti-spyware functions, albeit treated differently from viruses. Symantec Anti-Virus, for instance, categorizes spyware programs as "extended threats" and now offers
1749:
law articles that have been violated are art. 4.1 of the
Decision on universal service providers and on the interests of end users; the fines have been issued based on art. 15.4 taken together with art. 15.10 of the Dutch telecommunications law.
1037:
As the spyware threat has evolved, a number of techniques have emerged to counteract it. These include programs designed to remove or block spyware, as well as various user practices which reduce the chance of getting spyware on a system.
720:. These four categories are not mutually exclusive and they have similar tactics in attacking networks and devices. The main goal is to install, hack into the network, avoid being detected, and safely remove themselves from the network.
941:
A spyware rarely operates alone on a computer; an affected machine usually has multiple infections. Users frequently notice unwanted behavior and degradation of system performance. A spyware infestation can create significant unwanted
3660:
958:
experts, or even buying a new computer because the existing system "has become too slow". Badly infected systems may require a clean reinstallation of all their software in order to return to full functionality.
3505:
Attorney General Spitzer today sued one of the nation's leading internet marketing companies, alleging that the firm was the source of "spyware" and "adware" that has been secretly installed on millions of home
1151:
Anti-spyware software programs can be used solely for detection and removal of spyware software that has already been installed into the computer. This kind of anti-spyware can often be set to scan on a regular
639:
are particularly vulnerable to such attacks, not only because IE was the most widely used, but also because its tight integration with Windows allows spyware access to crucial parts of the operating system.
1786:
for spyware that displays their ads. In many cases, the companies whose advertisements appear in spyware pop-ups do not directly do business with the spyware firm. Rather, they have contracted with an
2795:
750:
Sometimes, spyware is included along with genuine software, and may come from a malicious website or may have been added to the intentional functionality of genuine software (see the paragraph about
1354:, bank information, etc."; however it turned out that "it actually (was) its own sophisticated criminal little trojan that's independent of CWS." This case is currently under investigation by the
974:. Some spyware disables or even removes competing spyware programs, on the grounds that more spyware-related annoyances increase the likelihood that users will take action to remove the programs.
3323:
2577:
739:
suggests software that monitors a user's computer, the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including personal information like
1955:
3391:
1255:
from a variety of companies. These monitor the flow of information going to and from a networked computer and provide protection against spyware and malware. Some users install a large
1524:
can warn users that their computers have been infected with spyware, directing them to purchase programs which do not actually remove spyware—or else, may add more spyware of their own.
849:
Most spyware is installed without knowledge, or by using deceptive tactics. Spyware may try to deceive users by bundling itself with desirable software. Other common tactics are using a
2321:
950:
In some infections, the spyware is not even evident. Users assume in those situations that the performance issues relate to faulty hardware, Windows installation problems, or another
1474:
are collectively known as "Gator". Likewise, programs that are frequently installed together may be described as parts of the same spyware package, even if they function separately.
1392:
technology Like spyware, not only was it difficult to detect and uninstall, it was so poorly written that most efforts to remove it could have rendered computers unable to function.
3303:
1507:
2001:
842:
because infected systems generally do not attempt to transmit or copy the software to other computers. Instead, spyware installs itself on a system by deceiving the user or by
3519:
747:. Some spyware can change computer settings, which can result in slow Internet connection speeds, un-authorized changes in browser settings, or changes to software settings.
2346:
743:
habits, user logins, and bank or credit account information. Spyware can also interfere with a user's control of a computer by installing additional software or redirecting
1427:
consent may be illegal; the author of Loverspy and several users of the product were indicted in California in 2005 on charges of wiretapping and various computer crimes.
3650:
1219:. Though no browser is completely safe, Internet Explorer was once at a greater risk for spyware infection due to its large user base as well as vulnerabilities such as
860:. Its popularity and history of security issues have made it a frequent target. Its deep integration with the Windows environment make it susceptible to attack into the
2928:
818:
that you went there and also your identity within those accounts. Let's say you moved on to something like a site about depression. This one also has a tweet button, a
1023:
pop-up will prompt the user to allow or deny the action. This improves on the design used by previous versions of Windows. Spyware is also known as tracking software.
542:
with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their
3553:
1790:, which in turn contracts with an online subcontractor who gets paid by the number of "impressions" or appearances of the advertisement. Some major firms such as
1342:. In August 2005, researchers from security software firm Sunbelt Software suspected the creators of the common CoolWebSearch spyware had used it to transmit "
3105:
2975:
2949:
766:. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.
2792:
2622:
3464:
2302:
2574:
3320:
2721:
1666:(EULA). Many users habitually ignore these purported contracts, but spyware companies such as Claria say these demonstrate that users have consented.
1642:, and similar laws in other countries. Since owners of computers infected with spyware generally claim that they never authorized the installation, a
1041:
Nonetheless, spyware remains a costly problem. When a large number of pieces of spyware have infected a Windows computer, the only remedy may involve
2046:
1947:
234:
2377:
1470:
behaviors, or by "following the money" of apparent financial or business connections. For instance, a number of the spyware programs distributed by
1203:
To detect spyware, computer users have found several practices useful in addition to installing anti-spyware programs. Many users have installed a
2427:
1019:
is, by default, a computer administrator that runs everything under limited user privileges, when a program requires administrative privileges, a
4684:
2450:
3742:
1607:
3040:"Despite the hype, Apple security no match for NSO spyware - International investigation finds 23 Apple devices that were successfully hacked"
2483:
2318:
3488:
3049:
2338:
1617:
On January 26, 2006, Microsoft and the Washington state attorney general filed suit against Secure Computer for its Spyware Cleaner product.
1295:
3370:
2594:
Virvilis, Nikos; Mylonas, Alexios; Tsalis, Nikolaos; Gritzalis, Dimitris (2015). "Security Busters: Web Browser security vs. rogue sites".
2141:
1819:
3300:
2751:
2096:
4524:
1263:
programs offered for download. Downloading programs only from reputable sources can provide some protection from this source of attack.
3071:
565:. Because these behaviors are so common, and can have non-harmful uses, providing a precise definition of spyware is a difficult task.
514:
2065:
1180:
a result, anti-spyware software is of limited usefulness without regular updates. Updates may be installed automatically or manually.
4286:
3231:
2700:
1552:
2819:
2773:
FTC Releases Survey of Identity Theft in U.S. 27.3 Million Victims in Past 5 Years, Billions in Losses for Businesses and Consumers
3420:
3168:
1259:
which prevents the user's computer from connecting to known spyware-related web addresses. Spyware may get installed via certain
1063:
Many programmers and some commercial firms have released products designed to remove or block spyware. Programs such as PC Tools'
3628:
3406:
3346:
3196:
1842:
1836:
1768:
has pursued spyware companies for fraudulent installation of software. In a suit brought in 2005 by Spitzer, the California firm
1977:
4376:
2838:
2675:
895:
3690:
2419:
1242:'s Information Technology department released a report detailing the behavior of one particular piece of proxy-based spyware,
4263:
2925:
1737:
627:
spyware. As of 2006, spyware has become one of the preeminent security threats to computer systems running Microsoft Windows
344:
3530:
2858:
2125:
3578:
3279:
3446:
3115:
2402:
1455:
or other content deemed inappropriate, and to report it to the authority figure, who may then confront the user about it.
988:, mostly for convenience. Because of this, any program the user runs has unrestricted access to the system. As with other
4677:
4294:
3545:
2575:
Understanding the Web browser threat: Examination of vulnerable online Web browser populations and the insecurity iceberg
2017:
1379:
655:
component that a website wanted to install. The combination of user ignorance about these changes, and the assumption by
3602:
2775:
1818:
actions when their products have been so described. In 2003, Gator (now known as Claria) filed suit against the website
5106:
3735:
1195:
allows an anti-spyware program a better chance of removing persistent spyware. Killing the process tree may also work.
38:
3002:
4641:
4332:
4226:
2642:
1093:
and releasing it as a free download for Genuine Windows XP and Windows 2003 users. In November, 2005, it was renamed
928:
2904:
2871:
1775:
The hijacking of Web advertisements has also led to litigation. In June 2002, a number of large Web publishers sued
1230:—particularly colleges and universities—have taken a different approach to blocking spyware: they use their network
619:
toy company, was surreptitiously sending data back to Mattel. Since then, "spyware" has taken on its present sense.
5101:
4022:
3255:
1248:, and the steps the university took to intercept it. Many other educational institutions have taken similar steps.
3428:
2979:
2953:
2836:"Sony sued over copy-protected CDs; Sony BMG is facing three lawsuits over its controversial anti-piracy software"
1191:
detect attempts to remove registry keys and immediately add them again. Usually, booting the infected computer in
4736:
4529:
4276:
2626:
1758:
1700:
1355:
1079:
rapidly gained popularity as tools to remove, and in some cases intercept, spyware programs. On December, 2004,
947:
usage. Spyware, which interferes with networking software commonly causes difficulty connecting to the Internet.
55:
3471:
2299:
1685:
This does not, however, mean that every such agreement is a contract, or that every term in one is enforceable.
4670:
4356:
507:
663:
components are benign, helped to spread spyware significantly. Many spyware components would also make use of
5116:
4719:
4595:
4089:
3728:
447:
244:
127:
117:
2718:
2038:
1892:
1635:
1375:
1075:
993:
154:
142:
3682:
2369:
5111:
4967:
4281:
4202:
4002:
2817:
Attorney General Abbott Brings First Enforcement Action In Nation Against Sony BMG For Spyware Violations
843:
664:
229:
3039:
5131:
5121:
5035:
4915:
4615:
4258:
4216:
3872:
1879:
1663:
466:
204:
2460:
5096:
5030:
4756:
4483:
4119:
3837:
1673:
agreements, under which a single click can be taken as consent to the entire text, relatively little
1407:
1389:
1227:
997:
985:
705:
648:
500:
249:
1183:
A popular generic spyware removal tool used by those that requires a certain degree of expertise is
4940:
4417:
4407:
4104:
3982:
3877:
2493:
1732:
1717:
1464:
1386:
1362:
1058:
910:
850:
701:
562:
425:
384:
354:
304:
3492:
3079:
1528:
claiming to be anti-spyware unless it is verified to be legitimate. Some known offenders include:
791:, but by the default settings created for users and the language of terms-of-service agreements.
5126:
5060:
4493:
4192:
4144:
3807:
3367:
1511:
1448:
1318:
harmed by having to pay out affiliate revenues to an "affiliate" who is not party to a contract.
971:
943:
796:
164:
4879:
4751:
4544:
4371:
2743:
2226:
2148:
2093:
1922:
1403:
suits were filed. Sony BMG later provided a workaround on its website to help users remove it.
1393:
419:
4478:
4899:
4741:
4693:
4325:
4233:
3967:
1772:
ended up settling, by agreeing to pay US$ 7.5 million and to stop distributing spyware.
1592:
1487:
1231:
1032:
1001:
963:
868:
754:, below). In response to the emergence of spyware, a small industry has sprung up dealing in
1049:. For instance, some spyware cannot be completely removed by Symantec, Microsoft, PC Tools.
4990:
4874:
4864:
4746:
4729:
4651:
4646:
4605:
4534:
4392:
4253:
4165:
4114:
4059:
3927:
3900:
3882:
3780:
3751:
2697:
2488:
2455:
2062:
1897:
1769:
1762:
1137:
1118:
1020:
437:
379:
299:
3847:
3491:(Press release). Office of New York State Attorney General. April 28, 2005. Archived from
3228:
8:
4995:
4980:
4777:
4600:
4037:
3812:
3770:
3044:
2816:
1725:
1639:
1307:
1005:
644:
414:
239:
149:
5136:
5055:
5045:
5000:
4714:
4585:
4422:
4402:
4221:
4149:
4054:
3415:
3403:
3165:
2551:
2516:
2207:
1927:
1787:
1721:
1693:
1597:
1343:
1239:
1105:
967:
814:. Those buttons, without you clicking on them, have just reported back to Facebook and
810:
794:
In one documented example, on CBS/CNet News reported, on March 7, 2011, an analysis in
546:, endangering their device's security, or other means. This behavior may be present in
3715:
3625:
3343:
3206:
3138:
1984:
1223:
but these three major browsers are now close to equivalent when it comes to security.
5070:
5010:
4985:
4809:
4610:
4564:
4473:
4269:
4027:
3962:
3912:
3859:
3817:
3765:
3010:
2556:
2538:
2254:
2246:
2199:
1811:
1314:
1252:
1208:
1085:
1009:
955:
861:
857:
763:
759:
725:
656:
632:
409:
372:
339:
3520:"Intermix Media Inc. says it is settling spyware lawsuit with N.Y. attorney general"
2835:
2672:
2300:
Trojan Horse Resurrected: On the Legality of the Use of Government Spyware (Govware)
2211:
867:. Internet Explorer also serves as a point of attachment for spyware in the form of
5091:
4884:
4701:
4625:
4590:
4318:
4238:
4178:
3942:
3932:
3827:
2603:
2546:
2528:
2281:
2238:
2189:
1650:
Spyware producers argue that, contrary to the users' claims, users do in fact give
1323:
1161:
1157:
1145:
1094:
1046:
989:
864:
740:
680:
675:
628:
389:
90:
1854:
the school's server. The LANrev software disabled the webcams for all other uses (
1124:
Other Anti-spyware tools include FlexiSPY, Mobilespy, mSPY, TheWiSPY, and UMobix.
758:
software. Running anti-spyware software has become a widely recognized element of
5065:
5040:
5022:
4889:
4826:
4782:
4620:
4559:
4463:
4129:
4109:
4007:
3832:
3822:
3632:
3606:
3582:
3450:
3424:
3410:
3374:
3350:
3327:
3307:
3283:
3259:
3235:
3172:
3110:
2932:
2842:
2823:
2799:
2779:
2725:
2704:
2679:
2581:
2406:
2325:
2306:
2242:
2129:
2117:
2100:
2069:
2050:
2021:
1783:
1212:
906:
729:
671:, Internet Explorer and Windows to install without user knowledge or permission.
169:
60:
29:
3575:
3441:
3276:
2004:
posted to rec..programmer; retrieved from groups.google.com November 28, 2006.
4580:
4554:
4361:
4299:
4197:
4047:
3997:
3972:
3937:
3917:
3797:
3785:
3185:
XPAntivirus, Personal Antivirus, Home Antivirus 20xx, VirusDoctor, and ECsecure
3166:
The Spyware Warrior List of Rogue/Suspect Anti-Spyware Products & Web Sites
2901:
2607:
2399:
1631:
1537:
1517:
1339:
1326:
of most affiliate marketing networks. Mobile devices can also be vulnerable to
1286:
1169:
1101:
1064:
835:
769:
In German-speaking countries, spyware used or made by the government is called
586:
478:
309:
262:
192:
73:
50:
2772:
2014:
1172:, one of the first to offer real-time protection, blocked the installation of
822:
widget, and those, too, can report back who you are and that you went there."
5085:
4945:
4724:
4539:
4458:
4366:
4209:
4170:
4139:
4134:
3987:
3977:
3947:
3636:
3599:
3301:
Privacy Policies, Terms and Conditions, Website Contracts, Website Agreements
3014:
2908:
2542:
2250:
2203:
1795:
1791:
1765:
1587:
1582:
1533:
1415:" on a daily basis, like spyware. It can be removed with the RemoveWGA tool.
1281:
1216:
1016:
970:, and/or reduce browser security settings, which opens the system to further
839:
611:
314:
209:
106:
16:
Malware that collects and transmits user information without their knowledge
4869:
4831:
4819:
4794:
4397:
4243:
4099:
3802:
2815:
Press release from the Texas Attorney General's office, November 21, 2005;
2560:
2258:
1887:
1412:
1400:
805:
755:
697:
551:
402:
269:
222:
77:
3453:(FTC press release November 17, 2008, with links to supporting documents).
2879:
2650:
2631:". Cornell University, Office of Information Technologies. March 31, 2005.
2515:
Qabalin, Majdi K.; Naser, Muawya; Alkasassbeh, Mouhammd (August 2, 2022).
2194:
2177:
1824:
1238:
to block access to Web sites known to install spyware. On March 31, 2005,
574:
550:
and in legitimate software. Websites may engage in spyware behaviors like
5050:
4975:
4925:
4789:
4549:
4468:
4183:
4017:
3992:
3957:
3792:
2285:
1902:
1859:
1577:
1495:
1452:
1436:
1423:
1396:
1319:
1303:
1244:
1204:
1069:
744:
717:
651:, the browser would automatically display an installation window for any
636:
558:
531:
472:
359:
96:
4662:
3252:
2872:"Description of the Windows Genuine Advantage Notifications application"
2484:"Microsoft Windows AntiSpyware is now......"Windows Defender""
4957:
4930:
4894:
4508:
4488:
4453:
4248:
4064:
4012:
3895:
3775:
3720:
1867:
1863:
1815:
1807:
1699:
In the United States, lawmakers introduced a bill in 2005 entitled the
1678:
1572:
1542:
1491:
1374:
Some copy-protection technologies have borrowed from spyware. In 2005,
1327:
1256:
1184:
1141:
780:
668:
609:. Later in 2000, a parent using ZoneAlarm was alerted to the fact that
329:
324:
101:
2533:
954:
infection. Some owners of badly infected systems resort to contacting
826:
analysis was researched by Brian Kennish, founder of Disconnect, Inc.
5005:
4952:
4848:
4836:
4498:
4448:
4124:
4079:
4074:
3922:
3890:
3655:
3392:
Federal Trade Commission v. Sperry & Hutchinson Trading Stamp Co.
1917:
1798:
have sacked advertising agencies that have run their ads in spyware.
1655:
1567:
1557:
1547:
1521:
1483:
1347:
1291:
1260:
1235:
1192:
1080:
977:
709:
606:
602:
598:
582:
349:
199:
179:
84:
45:
1681:
jurisdictions that this type of agreement can be a binding contract
4814:
4804:
4799:
4709:
4084:
4042:
3905:
3072:"Activists and journalists in Mexico complain of government spying"
3038:
Timberg, Craig; Albergotti, Reed; Guéguen, Elodie (July 19, 2021).
2517:"Android Spyware Detection Using Machine Learning: A Novel Dataset"
1978:
Monitoring Software on Your PC: Spyware, Adware, and Other Software
1912:
1806:
Litigation has gone both ways. Since "spyware" has become a common
1659:
1602:
1351:
1165:
801:
751:
539:
443:
174:
122:
2370:"'Like,' 'tweet' buttons divulge sites you visit: CNET News Video"
1782:
Courts have not yet had to decide whether advertisers can be held
1148:
data is scanned for spyware, and any detected threats are blocked.
4920:
4841:
4412:
4341:
4310:
4069:
4032:
3414:(FTC press release with links to supporting documents); see also
2673:
The Effect of 180solutions on Affiliate Commissions and Merchants
1907:
1674:
1651:
1562:
1382:
1220:
1173:
951:
815:
713:
660:
652:
547:
543:
431:
294:
287:
159:
2573:
Stefan Frei, Thomas Duebendofer, Gunter Ollman, and Martin May,
4772:
4443:
4438:
3952:
3867:
3635:, LMSD Redacted Forensic Analysis, L-3 Services – prepared for
3524:
3106:"Government Hackers Caught Using Unprecedented iPhone Spy Tool"
1847:
1776:
1486:, which in the 2010s sold spyware to governments for spying on
1471:
1267:
Guidelines for Managing the Security of Mobile Devices, 2013).
1113:
1109:
1042:
819:
693:
616:
578:
485:
334:
274:
112:
3651:"School district accused of spying on kids via laptop webcams"
3417:
FTC cracks down on spyware and PC hijacking, but not true lies
3064:
2593:
2272:
Ames, Wes (2004). "Understanding spyware: risk and response".
1740:(EPIC) brought the RemoteSpy software to the FTC's attention.
1614:
Fake antivirus products constitute 15 percent of all malware.
1310:
revenues from the legitimate affiliate to the spyware vendor.
3143:
2950:"Creator and Four Users of Loverspy Spyware Program Indicted"
2339:"The tricky issue of spyware with a badge: meet 'policeware'"
1731:
In a second case, brought against CyberSpy Software LLC, the
1677:
has resulted from their use. It has been established in most
3427:, Micro Law, IEEE MICRO (Jan.-Feb. 2005), also available at
2793:"Sony, Rootkits and Digital Rights Management Gone Too Far,"
1330:, which manipulates users into illegitimate mobile charges.
1275:
3716:
Home Computer Security – Carnegie Mellon Software Institute
3201:
2398:
Edelman, Ben; December 7, 2004 (updated February 8, 2005);
1689:
1670:
728:, may be installed by the owner of a shared, corporate, or
2176:
Kim, Taejin; Yi, Jeong Hyun; Seo, Changho (January 2014).
605:, Gregor Freund, used the term in a press release for the
2451:"What's in a name?? A lot!! Announcing Windows Defender!"
2178:"Spyware Resistant Smartphone User Authentication Scheme"
1520:(fake) anti-spyware programs, and widely distributed Web
981:
capable of collecting screen captures from the computer.
834:
Spyware does not necessarily spread in the same way as a
623:
3037:
3003:"The Ungodly Surveillance of Anti-Porn 'Shameware' Apps"
2952:. Department of Justice. August 26, 2005. Archived from
1870:, including webcam shots of students in their bedrooms.
1779:
for replacing advertisements, but settled out of court.
902:
2514:
3639:(LMSD's counsel), May 2010. Retrieved August 15, 2010.
2420:"Microsoft Acquires Anti-Spyware Leader GIANT Company"
1516:
Malicious programmers have released a large number of
1338:
In one case, spyware has been closely associated with
1132:
Anti-spyware programs can combat spyware in two ways:
3197:"Google: Fake antivirus is 15 percent of all malware"
3103:
2118:
Analyzing IE At 10: Integration With OS Smart Or Not?
1948:"Amazon Workers Are Listening to What You Tell Alexa"
2400:
Direct Revenue Deletes Competitors from Users' Disks
2182:
International Journal of Distributed Sensor Networks
2039:
Privacy Worries Arise Over Spyware in Kids' Software
1801:
1435:
Anti-spyware programs often report Web advertisers'
3321:
CHAPTER 715 Computer Spyware and Malware Protection
2698:
Massive spyware-based identity theft ring uncovered
1630:Unauthorized access to a computer is illegal under
615:, educational software marketed to children by the
3293:
3104:Franceschi-Bicchierai, Lorenzo (August 25, 2016).
2829:
2392:
1654:to installations. Spyware that comes bundled with
1127:
3621:
3619:
3404:FTC Permanently Halts Unlawful Spyware Operations
1688:Some jurisdictions, including the U.S. states of
962:Moreover, some types of spyware disable software
5083:
2902:Windows XP update may be classified as 'spyware'
2809:
856:The installation of spyware frequently involves
601:purposes. However, in early 2000 the founder of
3099:
3097:
2852:
2849:November 10, 2005. Retrieved November 22, 2006.
2000:Vossen, Roland (attributed); October 21, 1995;
3616:
3310:; coollawyer.com. Retrieved November 28, 2006.
3033:
3031:
2806:October 31, 2005. Retrieved November 22, 2006.
2782:. Federal Trade Commission, September 3, 2003.
2643:"Information About Spyware in SpyWareLoop.com"
2409:; benedelman.com. Retrieved November 28, 2006.
1970:
1501:
692:Spyware is mostly classified into four types:
4678:
4326:
3736:
3648:
2926:Microsoft's antipiracy tool phones home daily
2336:
1000:accounts. Alternatively, they can reduce the
508:
3683:"Suit: Schools Spied on Students Via Webcam"
3194:
3094:
2785:
2088:
2086:
1703:, which would imprison creators of spyware.
1369:
774:
762:practices, especially for computers running
704:; examples of other notorious types include
3178:
3028:
2665:
1706:
1333:
4685:
4671:
4333:
4319:
3743:
3729:
3229:Antispyware Company Sued Under Spyware Law
3139:"Spyware-Removal Program Tagged as a Trap"
2623:"Blocking Marketscore: Why Cornell Did It"
1156:Such programs inspect the contents of the
1026:
554:. Hardware devices may also be affected.
515:
501:
4692:
4287:Security information and event management
3546:"Major advertisers caught in spyware net"
3381:March 16, 2007. Retrieved March 24, 2007.
2640:
2550:
2532:
2225:Bergren, Martha Dewey (October 1, 2004).
2193:
2083:
1418:
1406:Beginning on April 25, 2006, Microsoft's
929:Learn how and when to remove this message
773:by computer experts (in common parlance:
732:intentionally in order to monitor users.
3750:
3642:
3489:"State Sues Major "Spyware" Distributor"
2939:June 7, 2006. Retrieved August 31, 2014.
2175:
1052:
901:Relevant discussion may be found on the
874:
871:, which modify the browser's behaviour.
3663:from the original on September 13, 2012
3556:from the original on September 20, 2008
3543:
3136:
2224:
2055:
1837:Robbins v. Lower Merion School District
1004:of specific vulnerable Internet-facing
992:, Windows users are able to follow the
5084:
4377:Timeline of computer viruses and worms
2915:June 5, 2006. Retrieved June 13, 2006.
2481:
2367:
2031:
2007:
1994:
1045:user data, and fully reinstalling the
913:to additional sources at this section.
829:
783:" has been used for similar purposes.
696:, system monitors, tracking including
557:Spyware is frequently associated with
4666:
4314:
4264:Host-based intrusion detection system
3724:
2448:
2349:from the original on November 6, 2012
2171:
2169:
1738:Electronic Privacy Information Center
1658:applications may be described in the
1198:
3462:
3443:Court Orders Halt to Sale of Spyware
3344:Chapter 19.270 RCW: Computer spyware
3277:180solutions sues allies over adware
3000:
2741:
2271:
2078:The National Cyber Security Alliance
1983:(Report). March 2005. Archived from
1958:from the original on August 29, 2020
878:
4295:Runtime application self-protection
3693:from the original on August 1, 2013
3649:Doug Stanglin (February 18, 2010).
2859:Information About XCP Protected CDs
2754:from the original on March 19, 2018
2742:Alex, Eckelberry (August 9, 2005).
2634:
2584:, Communication Systems Group, 2008
2380:from the original on March 10, 2016
2134:
1743:
1458:
1306:. Stealware diverts the payment of
1089:software, re‑branding it as
1033:Computer virus § Virus removal
577:occurred on October 16, 1995, in a
573:The first recorded use of the term
235:forensics-focused operating systems
13:
4340:
3846:
3544:Gormley, Michael (June 25, 2005).
3253:Lawsuit filed against 180solutions
3052:from the original on July 19, 2021
2482:Dodson, Steve (November 4, 2005).
2430:from the original on June 17, 2005
2166:
1477:
1430:
1251:Individual users can also install
894:relies largely or entirely upon a
14:
5148:
4642:Computer and network surveillance
4227:Security-focused operating system
3709:
3368:US lawmakers introduce I-Spy bill
3137:Roberts, Paul F. (May 26, 2005).
2449:Garms, Jason (November 4, 2005).
1802:Libel suits by spyware developers
1711:
806:tracking users' browsing activity
4023:Insecure direct object reference
3626:"Initial LANrev System Findings"
2748:The Legacy Sunbelt Software Blog
1494:. NSO Group was investigated by
883:
708:capabilities that "phone home",
4277:Information security management
3675:
3592:
3568:
3537:
3529:. June 15, 2005. Archived from
3511:
3481:
3456:
3434:
3396:
3384:
3360:
3337:
3313:
3269:
3245:
3221:
3195:Elinor Mills (April 27, 2010).
3188:
3158:
3130:
3078:. June 20, 2017. Archived from
2994:
2968:
2942:
2918:
2894:
2864:
2766:
2735:
2711:
2708:. Ars Technica, August 5, 2005.
2689:
2614:
2587:
2567:
2508:
2475:
2442:
2412:
2368:Cooley, Brian (March 7, 2011).
2361:
2337:Jeremy Reimer (July 20, 2007).
2330:
2312:
2292:
2265:
2218:
1759:New York State Attorney General
1701:Internet Spyware Prevention Act
1625:
1620:
1508:List of rogue security software
1399:filed suit, and three separate
1294:", and what spyware researcher
1280:A few spyware vendors, notably
1276:"Stealware" and affiliate fraud
1270:
1140:in a manner similar to that of
1128:How anti-spyware software works
1100:Major anti-virus firms such as
56:Hacking of consumer electronics
4357:Comparison of computer viruses
3357:. Retrieved November 14, 2006.
2861:. Retrieved November 29, 2006.
2826:. Retrieved November 28, 2006.
2686:. Retrieved November 14, 2006.
2110:
1940:
1858:, students were unable to use
1091:Microsoft AntiSpyware (Beta 1)
561:and involves many of the same
1:
4596:Data loss prevention software
2744:"Identity Theft? What to do?"
2719:"Massive identity theft ring"
2319:FAQ – Häufig gestellte Fragen
2231:The Journal of School Nursing
1933:
1830:
1076:Spybot - Search & Destroy
622:According to a 2005 study by
2243:10.1177/10598405040200050801
2063:AOL/NCSA Online Safety Study
2043:U.S. News & World Report
1893:Employee monitoring software
1752:
1636:Computer Fraud and Abuse Act
1442:
1376:Sony BMG Music Entertainment
994:principle of least privilege
647:SP2 was released as part of
155:Chaos Communication Congress
7:
4968:Software release life cycle
4282:Information risk management
4203:Multi-factor authentication
3759:Related security categories
3576:See you later, anti-Gators?
3332:nxtsearch.legis.state.ia.us
3175:". Retrieved July 10, 2005.
3171:September 22, 2018, at the
2703:September 16, 2008, at the
2641:Vincentas (July 11, 2013).
2580:September 11, 2016, at the
2128:September 29, 2007, at the
1873:
1502:Rogue anti-spyware programs
984:A typical Windows user has
687:
607:ZoneAlarm Personal Firewall
10:
5153:
5036:Software protection dongle
4916:Unwanted software bundling
4616:Intrusion detection system
4259:Intrusion detection system
4217:Computer security software
3873:Advanced persistent threat
3423:December 26, 2010, at the
2978:. Symantec. Archived from
2608:10.1016/j.cose.2015.04.009
2099:December 16, 2006, at the
2068:December 13, 2005, at the
1834:
1827:to denote these products.
1664:end-user license agreement
1505:
1462:
1056:
1030:
846:software vulnerabilities.
568:
467:2600: The Hacker Quarterly
205:List of computer criminals
5107:Computer network security
5031:Digital rights management
5021:
4966:
4908:
4857:
4765:
4700:
4634:
4573:
4517:
4484:Privacy-invasive software
4431:
4385:
4349:
4158:
3858:
3844:
3838:Digital rights management
3758:
3463:OPTA (November 5, 2007).
3449:December 4, 2010, at the
3409:November 2, 2013, at the
3334:. Retrieved May 11, 2011.
2305:February 1, 2014, at the
2049:November 3, 2013, at the
2002:Win 95 Source code in c!!
1810:, some makers have filed
1724:organizations under the "
1683:in certain circumstances.
1408:Windows Genuine Advantage
1390:digital rights management
1370:Digital rights management
1144:protection: all incoming
986:administrative privileges
800:revealed the practice of
706:digital rights management
649:Windows XP Service Pack 2
4909:Deceptive and/or illicit
3983:Denial-of-service attack
3878:Arbitrary code execution
3600:Gator Information Center
3373:January 8, 2009, at the
3282:August 10, 2011, at the
2931:August 28, 2012, at the
2913:Lauren Weinstein's Blog,
2596:Computers & Security
2309:, LISS 2013, pp. 419–428
1718:Federal Trade Commission
1707:Administrative sanctions
1669:Despite the ubiquity of
1482:Spyware vendors include
1465:List of spyware programs
1363:Federal Trade Commission
1334:Identity theft and fraud
1284:, have written what the
1059:Category:Spyware removal
972:opportunistic infections
385:Cloud computing security
5102:Rogue security software
5061:Software license server
4494:Rogue security software
4193:Computer access control
4145:Rogue security software
3808:Electromagnetic warfare
3299:Coollawyer; 2001–2006;
2798:April 28, 2010, at the
2122:TechWeb Technology News
2094:Is It Time to Ditch IE?
1634:laws, such as the U.S.
1512:Rogue security software
1449:accountability software
1121:against these threats.
1027:Remedies and prevention
824:The Wall Street Journal
797:The Wall Street Journal
581:post that poked fun at
165:Hackers on Planet Earth
4737:Freely redistributable
4530:Classic Mac OS viruses
4372:List of computer worms
4239:Obfuscation (software)
3968:Browser Helper Objects
3852:
3631:June 15, 2010, at the
3581:July 14, 2014, at the
3349:July 21, 2011, at the
3326:April 6, 2012, at the
3258:June 22, 2008, at the
2822:July 25, 2010, at the
2671:Edelman, Ben (2004). "
1923:Technical support scam
1488:human rights activists
1419:Personal relationships
1394:Texas Attorney General
1322:is a violation of the
1313:Spyware which attacks
869:Browser Helper Objects
804:and other websites of
775:
420:Homebrew Computer Club
4900:Software as a service
4694:Software distribution
4234:Data-centric security
4115:Remote access trojans
3850:
3605:July 1, 2005, at the
3306:May 13, 2013, at the
3234:July 6, 2008, at the
2841:May 30, 2009, at the
2778:May 18, 2008, at the
2724:May 11, 2011, at the
2695:Ecker, Clint (2005).
2678:July 6, 2010, at the
2629:on February 14, 2007.
2426:. December 16, 2004.
2405:July 6, 2010, at the
2020:May 10, 2011, at the
1990:on December 26, 2010.
1593:WinAntiVirus Pro 2006
1053:Anti-spyware programs
875:Effects and behaviors
635:(IE) was the primary
631:. Computers on which
5117:Espionage techniques
4991:Software maintenance
4865:Digital distribution
4720:Free and open-source
4652:Operation: Bot Roast
4166:Application security
4060:Privilege escalation
3928:Cross-site scripting
3781:Cybersex trafficking
3752:Information security
3477:on January 29, 2011.
3118:on February 24, 2023
2956:on November 19, 2013
2496:on November 24, 2005
2463:on November 23, 2005
2324:May 6, 2013, at the
2286:10.1109/MITP.2004.71
1898:Industrial espionage
1770:Intermix Media, Inc.
1763:Governor of New York
1138:real-time protection
1119:real-time protection
1073:and Patrick Kolla's
1021:User Account Control
907:improve this article
438:Masters of Deception
380:Application security
4996:Software maintainer
4778:Commercial software
4766:Compensation models
4601:Defensive computing
4518:By operating system
3813:Information warfare
3771:Automotive security
3589:. October 22, 2003.
3495:on January 10, 2009
3045:The Washington Post
2900:Weinstein, Lauren.
2791:Russinovich, Mark.
2653:on November 3, 2013
2195:10.1155/2014/237125
2154:on November 1, 2013
2124:. August 25, 2005.
2107:. September 1, 2004
2092:Spanbauer, Scott. "
2015:The Spyware Inferno
1726:unfairness doctrine
1640:Computer Misuse Act
1308:affiliate marketing
830:Routes of infection
645:Internet Explorer 6
415:Chaos Computer Club
150:Black Hat Briefings
24:Part of a series on
5112:Online advertising
5056:Software copyright
5046:Product activation
5001:Software publisher
4715:Floating licensing
4586:Antivirus software
4432:Malware for profit
4403:Man-in-the-browser
4350:Infectious malware
4222:Antivirus software
4090:Social engineering
4055:Polymorphic engine
4008:Fraudulent dialers
3913:Hardware backdoors
3853:
3613:November 14, 2005.
3517:Gormley, Michael.
3266:September 13, 2005
3227:McMillan, Robert.
2982:on January 6, 2010
2717:Eckelberry, Alex.
2620:Schuster, Steve. "
2028:. August 13, 2004.
2013:Wienbar, Sharon. "
1954:. April 10, 2019.
1928:Microphone blocker
1788:advertising agency
1722:Internet marketing
1598:Windows Police Pro
1315:affiliate networks
1240:Cornell University
1199:Security practices
1166:installed programs
968:antivirus software
811:The New York Times
776:Regierungstrojaner
245:Social engineering
5132:Security breaches
5122:Espionage devices
5079:
5078:
5071:Torrent poisoning
4986:Long-term support
4810:Pay what you want
4660:
4659:
4611:Internet security
4565:HyperCard viruses
4474:Keystroke logging
4464:Fraudulent dialer
4408:Man-in-the-middle
4308:
4307:
4270:Anomaly detection
4175:Secure by default
4028:Keystroke loggers
3963:Drive-by download
3851:vectorial version
3818:Internet security
3766:Computer security
3689:. March 8, 2010.
3533:on June 22, 2005.
3242:January 26, 2006.
3001:Mehrotra, Dhruv.
2976:"Tracking Cookie"
2907:July 9, 2012, at
2876:Microsoft Support
2534:10.3390/s22155765
2489:blogs.technet.com
2456:blogs.technet.com
1380:found to be using
1209:Internet Explorer
1136:They can provide
1086:GIANT AntiSpyware
1010:Internet Explorer
990:operating systems
956:technical support
939:
938:
931:
858:Internet Explorer
764:Microsoft Windows
760:computer security
657:Internet Explorer
633:Internet Explorer
629:operating systems
593:at first denoted
525:
524:
373:Computer security
340:Keystroke logging
5144:
5097:Types of malware
4885:Product bundling
4858:Delivery methods
4757:Source-available
4687:
4680:
4673:
4664:
4663:
4626:Network security
4591:Browser security
4335:
4328:
4321:
4312:
4311:
4179:Secure by design
4110:Hardware Trojans
3943:History sniffing
3933:Cross-site leaks
3828:Network security
3745:
3738:
3731:
3722:
3721:
3703:
3702:
3700:
3698:
3679:
3673:
3672:
3670:
3668:
3646:
3640:
3623:
3614:
3596:
3590:
3572:
3566:
3565:
3563:
3561:
3541:
3535:
3534:
3515:
3509:
3508:
3502:
3500:
3485:
3479:
3478:
3476:
3470:. Archived from
3469:
3460:
3454:
3438:
3432:
3400:
3394:
3388:
3382:
3364:
3358:
3341:
3335:
3317:
3311:
3297:
3291:
3273:
3267:
3249:
3243:
3225:
3219:
3218:
3216:
3214:
3205:. Archived from
3192:
3186:
3182:
3176:
3164:Howes, Eric L. "
3162:
3156:
3155:
3153:
3151:
3134:
3128:
3127:
3125:
3123:
3114:. Archived from
3101:
3092:
3091:
3089:
3087:
3068:
3062:
3061:
3059:
3057:
3035:
3026:
3025:
3023:
3021:
2998:
2992:
2991:
2989:
2987:
2972:
2966:
2965:
2963:
2961:
2946:
2940:
2922:
2916:
2898:
2892:
2891:
2889:
2887:
2882:on June 18, 2010
2878:. Archived from
2868:
2862:
2856:
2850:
2833:
2827:
2813:
2807:
2789:
2783:
2770:
2764:
2763:
2761:
2759:
2739:
2733:
2715:
2709:
2693:
2687:
2669:
2663:
2662:
2660:
2658:
2649:. Archived from
2638:
2632:
2630:
2625:. Archived from
2618:
2612:
2611:
2591:
2585:
2571:
2565:
2564:
2554:
2536:
2512:
2506:
2505:
2503:
2501:
2492:. Archived from
2479:
2473:
2472:
2470:
2468:
2459:. Archived from
2446:
2440:
2439:
2437:
2435:
2416:
2410:
2396:
2390:
2389:
2387:
2385:
2365:
2359:
2358:
2356:
2354:
2334:
2328:
2316:
2310:
2296:
2290:
2289:
2269:
2263:
2262:
2222:
2216:
2215:
2197:
2173:
2164:
2163:
2161:
2159:
2153:
2147:. Archived from
2146:
2138:
2132:
2116:Keizer, Gregg. "
2114:
2108:
2090:
2081:
2059:
2053:
2045:. June 25, 2000
2037:Hawkins, Dana; "
2035:
2029:
2011:
2005:
1998:
1992:
1991:
1989:
1982:
1974:
1968:
1967:
1965:
1963:
1944:
1744:Netherlands OPTA
1647:faced lawsuits.
1459:Spyware programs
1324:terms of service
1176:-based spyware.
1162:operating system
1158:Windows registry
1095:Windows Defender
1047:operating system
934:
927:
923:
920:
914:
887:
886:
879:
865:operating system
778:
741:internet surfing
676:Windows Registry
517:
510:
503:
390:Network security
91:Hacker Manifesto
30:Computer hacking
21:
20:
5152:
5151:
5147:
5146:
5145:
5143:
5142:
5141:
5082:
5081:
5080:
5075:
5066:Software patent
5041:License manager
5023:Copy protection
5017:
4962:
4904:
4890:Retail software
4853:
4827:Open-core model
4783:Retail software
4761:
4696:
4691:
4661:
4656:
4635:Countermeasures
4630:
4621:Mobile security
4569:
4560:Palm OS viruses
4525:Android malware
4513:
4427:
4423:Zombie computer
4381:
4345:
4339:
4309:
4304:
4154:
3854:
3842:
3833:Copy protection
3823:Mobile security
3754:
3749:
3712:
3707:
3706:
3696:
3694:
3681:
3680:
3676:
3666:
3664:
3647:
3643:
3633:Wayback Machine
3624:
3617:
3607:Wayback Machine
3597:
3593:
3583:Wayback Machine
3573:
3569:
3559:
3557:
3542:
3538:
3518:
3516:
3512:
3498:
3496:
3487:
3486:
3482:
3474:
3467:
3461:
3457:
3451:Wayback Machine
3439:
3435:
3425:Wayback Machine
3411:Wayback Machine
3401:
3397:
3389:
3385:
3375:Wayback Machine
3365:
3361:
3355:apps.leg.wa.gov
3351:Wayback Machine
3342:
3338:
3328:Wayback Machine
3318:
3314:
3308:Wayback Machine
3298:
3294:
3284:Wayback Machine
3274:
3270:
3260:Wayback Machine
3250:
3246:
3236:Wayback Machine
3226:
3222:
3212:
3210:
3209:on May 10, 2011
3193:
3189:
3183:
3179:
3173:Wayback Machine
3163:
3159:
3149:
3147:
3135:
3131:
3121:
3119:
3102:
3095:
3085:
3083:
3082:on May 13, 2023
3070:
3069:
3065:
3055:
3053:
3036:
3029:
3019:
3017:
2999:
2995:
2985:
2983:
2974:
2973:
2969:
2959:
2957:
2948:
2947:
2943:
2933:Wayback Machine
2923:
2919:
2899:
2895:
2885:
2883:
2870:
2869:
2865:
2857:
2853:
2843:Wayback Machine
2834:
2830:
2824:Wayback Machine
2814:
2810:
2800:Wayback Machine
2790:
2786:
2780:Wayback Machine
2771:
2767:
2757:
2755:
2740:
2736:
2732:August 4, 2005.
2726:Wayback Machine
2716:
2712:
2705:Wayback Machine
2694:
2690:
2680:Wayback Machine
2670:
2666:
2656:
2654:
2639:
2635:
2621:
2619:
2615:
2592:
2588:
2582:Wayback Machine
2572:
2568:
2513:
2509:
2499:
2497:
2480:
2476:
2466:
2464:
2447:
2443:
2433:
2431:
2418:
2417:
2413:
2407:Wayback Machine
2397:
2393:
2383:
2381:
2366:
2362:
2352:
2350:
2335:
2331:
2326:Wayback Machine
2317:
2313:
2307:Wayback Machine
2297:
2293:
2274:IT Professional
2270:
2266:
2223:
2219:
2174:
2167:
2157:
2155:
2151:
2144:
2140:
2139:
2135:
2130:Wayback Machine
2115:
2111:
2101:Wayback Machine
2091:
2084:
2070:Wayback Machine
2060:
2056:
2051:Wayback Machine
2036:
2032:
2022:Wayback Machine
2012:
2008:
1999:
1995:
1987:
1980:
1976:
1975:
1971:
1961:
1959:
1946:
1945:
1941:
1936:
1876:
1839:
1833:
1804:
1755:
1746:
1714:
1709:
1628:
1623:
1612:
1514:
1504:
1480:
1478:Spyware vendors
1467:
1461:
1445:
1433:
1431:Browser cookies
1421:
1372:
1336:
1320:Affiliate fraud
1300:affiliate fraud
1278:
1273:
1213:Mozilla Firefox
1201:
1130:
1061:
1055:
1035:
1029:
935:
924:
918:
915:
909:by introducing
900:
888:
884:
877:
832:
735:While the term
730:public computer
690:
571:
536:spying software
521:
492:
491:
461:
453:
452:
405:
395:
394:
375:
365:
364:
290:
280:
279:
265:
255:
254:
225:
215:
214:
195:
185:
184:
170:Security BSides
145:
135:
134:
80:
66:
65:
61:List of hackers
41:
17:
12:
11:
5:
5150:
5140:
5139:
5134:
5129:
5127:Identity theft
5124:
5119:
5114:
5109:
5104:
5099:
5094:
5077:
5076:
5074:
5073:
5068:
5063:
5058:
5053:
5048:
5043:
5038:
5033:
5027:
5025:
5019:
5018:
5016:
5015:
5014:
5013:
5003:
4998:
4993:
4988:
4983:
4978:
4972:
4970:
4964:
4963:
4961:
4960:
4955:
4950:
4949:
4948:
4943:
4938:
4933:
4928:
4918:
4912:
4910:
4906:
4905:
4903:
4902:
4897:
4892:
4887:
4882:
4877:
4872:
4867:
4861:
4859:
4855:
4854:
4852:
4851:
4846:
4845:
4844:
4834:
4829:
4824:
4823:
4822:
4817:
4807:
4802:
4797:
4792:
4787:
4786:
4785:
4775:
4769:
4767:
4763:
4762:
4760:
4759:
4754:
4749:
4744:
4739:
4734:
4733:
4732:
4727:
4717:
4712:
4706:
4704:
4698:
4697:
4690:
4689:
4682:
4675:
4667:
4658:
4657:
4655:
4654:
4649:
4644:
4638:
4636:
4632:
4631:
4629:
4628:
4623:
4618:
4613:
4608:
4603:
4598:
4593:
4588:
4583:
4581:Anti-keylogger
4577:
4575:
4571:
4570:
4568:
4567:
4562:
4557:
4555:Mobile malware
4552:
4547:
4542:
4537:
4532:
4527:
4521:
4519:
4515:
4514:
4512:
4511:
4506:
4501:
4496:
4491:
4486:
4481:
4476:
4471:
4466:
4461:
4456:
4451:
4446:
4441:
4435:
4433:
4429:
4428:
4426:
4425:
4420:
4415:
4410:
4405:
4400:
4395:
4389:
4387:
4383:
4382:
4380:
4379:
4374:
4369:
4364:
4362:Computer virus
4359:
4353:
4351:
4347:
4346:
4338:
4337:
4330:
4323:
4315:
4306:
4305:
4303:
4302:
4300:Site isolation
4297:
4292:
4291:
4290:
4284:
4274:
4273:
4272:
4267:
4256:
4251:
4246:
4241:
4236:
4231:
4230:
4229:
4224:
4214:
4213:
4212:
4207:
4206:
4205:
4198:Authentication
4190:
4189:
4188:
4187:
4186:
4176:
4173:
4162:
4160:
4156:
4155:
4153:
4152:
4147:
4142:
4137:
4132:
4127:
4122:
4117:
4112:
4107:
4102:
4097:
4092:
4087:
4082:
4077:
4072:
4067:
4062:
4057:
4052:
4051:
4050:
4040:
4035:
4030:
4025:
4020:
4015:
4010:
4005:
4000:
3998:Email spoofing
3995:
3990:
3985:
3980:
3975:
3970:
3965:
3960:
3955:
3950:
3945:
3940:
3938:DOM clobbering
3935:
3930:
3925:
3920:
3918:Code injection
3915:
3910:
3909:
3908:
3903:
3898:
3893:
3885:
3880:
3875:
3870:
3864:
3862:
3856:
3855:
3845:
3843:
3841:
3840:
3835:
3830:
3825:
3820:
3815:
3810:
3805:
3800:
3798:Cyberterrorism
3795:
3790:
3789:
3788:
3786:Computer fraud
3783:
3773:
3768:
3762:
3760:
3756:
3755:
3748:
3747:
3740:
3733:
3725:
3719:
3718:
3711:
3710:External links
3708:
3705:
3704:
3674:
3641:
3615:
3591:
3574:Festa, Paul. "
3567:
3536:
3510:
3480:
3455:
3433:
3395:
3383:
3366:Gross, Grant.
3359:
3336:
3312:
3292:
3268:
3244:
3220:
3187:
3177:
3157:
3129:
3093:
3063:
3027:
2993:
2967:
2941:
2924:Evers, Joris.
2917:
2893:
2863:
2851:
2828:
2808:
2784:
2765:
2734:
2710:
2688:
2684:Benedelman.org
2664:
2633:
2613:
2586:
2566:
2507:
2474:
2441:
2411:
2391:
2360:
2329:
2311:
2291:
2264:
2237:(5): 293–294.
2217:
2165:
2133:
2109:
2082:
2074:America Online
2054:
2030:
2006:
1993:
1969:
1938:
1937:
1935:
1932:
1931:
1930:
1925:
1920:
1915:
1910:
1905:
1900:
1895:
1890:
1885:
1875:
1872:
1835:Main article:
1832:
1829:
1803:
1800:
1754:
1751:
1745:
1742:
1713:
1712:US FTC actions
1710:
1708:
1705:
1632:computer crime
1627:
1624:
1622:
1619:
1611:
1610:
1605:
1600:
1595:
1590:
1585:
1580:
1575:
1570:
1565:
1560:
1555:
1550:
1545:
1540:
1538:Antivirus 2009
1530:
1503:
1500:
1479:
1476:
1463:Main article:
1460:
1457:
1447:Shameware or "
1444:
1441:
1432:
1429:
1420:
1417:
1371:
1368:
1340:identity theft
1335:
1332:
1287:New York Times
1277:
1274:
1272:
1269:
1200:
1197:
1170:SpywareBlaster
1154:
1153:
1149:
1129:
1126:
1065:Spyware Doctor
1054:
1051:
1028:
1025:
937:
936:
905:. Please help
891:
889:
882:
876:
873:
831:
828:
689:
686:
587:business model
570:
567:
523:
522:
520:
519:
512:
505:
497:
494:
493:
490:
489:
482:
479:Nuts and Volts
475:
470:
462:
459:
458:
455:
454:
451:
450:
441:
435:
429:
426:Legion of Doom
423:
417:
412:
406:
401:
400:
397:
396:
393:
392:
387:
382:
376:
371:
370:
367:
366:
363:
362:
357:
352:
347:
342:
337:
332:
327:
322:
317:
312:
307:
302:
297:
291:
286:
285:
282:
281:
278:
277:
272:
266:
263:Practice sites
261:
260:
257:
256:
253:
252:
247:
242:
237:
232:
226:
221:
220:
217:
216:
213:
212:
207:
202:
196:
193:Computer crime
191:
190:
187:
186:
183:
182:
177:
172:
167:
162:
157:
152:
146:
141:
140:
137:
136:
133:
132:
131:
130:
125:
120:
109:
104:
99:
94:
87:
81:
74:Hacker culture
72:
71:
68:
67:
64:
63:
58:
53:
51:Cryptovirology
48:
42:
37:
36:
33:
32:
26:
25:
15:
9:
6:
4:
3:
2:
5149:
5138:
5135:
5133:
5130:
5128:
5125:
5123:
5120:
5118:
5115:
5113:
5110:
5108:
5105:
5103:
5100:
5098:
5095:
5093:
5090:
5089:
5087:
5072:
5069:
5067:
5064:
5062:
5059:
5057:
5054:
5052:
5049:
5047:
5044:
5042:
5039:
5037:
5034:
5032:
5029:
5028:
5026:
5024:
5020:
5012:
5009:
5008:
5007:
5004:
5002:
4999:
4997:
4994:
4992:
4989:
4987:
4984:
4982:
4979:
4977:
4974:
4973:
4971:
4969:
4965:
4959:
4956:
4954:
4951:
4947:
4944:
4942:
4939:
4937:
4934:
4932:
4929:
4927:
4924:
4923:
4922:
4919:
4917:
4914:
4913:
4911:
4907:
4901:
4898:
4896:
4893:
4891:
4888:
4886:
4883:
4881:
4880:Pre-installed
4878:
4876:
4873:
4871:
4868:
4866:
4863:
4862:
4860:
4856:
4850:
4847:
4843:
4840:
4839:
4838:
4835:
4833:
4830:
4828:
4825:
4821:
4818:
4816:
4813:
4812:
4811:
4808:
4806:
4803:
4801:
4798:
4796:
4793:
4791:
4788:
4784:
4781:
4780:
4779:
4776:
4774:
4771:
4770:
4768:
4764:
4758:
4755:
4753:
4752:Public domain
4750:
4748:
4745:
4743:
4740:
4738:
4735:
4731:
4728:
4726:
4723:
4722:
4721:
4718:
4716:
4713:
4711:
4708:
4707:
4705:
4703:
4699:
4695:
4688:
4683:
4681:
4676:
4674:
4669:
4668:
4665:
4653:
4650:
4648:
4645:
4643:
4640:
4639:
4637:
4633:
4627:
4624:
4622:
4619:
4617:
4614:
4612:
4609:
4607:
4604:
4602:
4599:
4597:
4594:
4592:
4589:
4587:
4584:
4582:
4579:
4578:
4576:
4572:
4566:
4563:
4561:
4558:
4556:
4553:
4551:
4548:
4546:
4545:MacOS malware
4543:
4541:
4540:Linux malware
4538:
4536:
4533:
4531:
4528:
4526:
4523:
4522:
4520:
4516:
4510:
4507:
4505:
4502:
4500:
4497:
4495:
4492:
4490:
4487:
4485:
4482:
4480:
4477:
4475:
4472:
4470:
4467:
4465:
4462:
4460:
4459:Form grabbing
4457:
4455:
4452:
4450:
4447:
4445:
4442:
4440:
4437:
4436:
4434:
4430:
4424:
4421:
4419:
4416:
4414:
4411:
4409:
4406:
4404:
4401:
4399:
4396:
4394:
4391:
4390:
4388:
4384:
4378:
4375:
4373:
4370:
4368:
4367:Computer worm
4365:
4363:
4360:
4358:
4355:
4354:
4352:
4348:
4343:
4336:
4331:
4329:
4324:
4322:
4317:
4316:
4313:
4301:
4298:
4296:
4293:
4288:
4285:
4283:
4280:
4279:
4278:
4275:
4271:
4268:
4265:
4262:
4261:
4260:
4257:
4255:
4252:
4250:
4247:
4245:
4242:
4240:
4237:
4235:
4232:
4228:
4225:
4223:
4220:
4219:
4218:
4215:
4211:
4210:Authorization
4208:
4204:
4201:
4200:
4199:
4196:
4195:
4194:
4191:
4185:
4182:
4181:
4180:
4177:
4174:
4172:
4171:Secure coding
4169:
4168:
4167:
4164:
4163:
4161:
4157:
4151:
4148:
4146:
4143:
4141:
4140:SQL injection
4138:
4136:
4133:
4131:
4128:
4126:
4123:
4121:
4120:Vulnerability
4118:
4116:
4113:
4111:
4108:
4106:
4105:Trojan horses
4103:
4101:
4100:Software bugs
4098:
4096:
4093:
4091:
4088:
4086:
4083:
4081:
4078:
4076:
4073:
4071:
4068:
4066:
4063:
4061:
4058:
4056:
4053:
4049:
4046:
4045:
4044:
4041:
4039:
4036:
4034:
4031:
4029:
4026:
4024:
4021:
4019:
4016:
4014:
4011:
4009:
4006:
4004:
4001:
3999:
3996:
3994:
3991:
3989:
3988:Eavesdropping
3986:
3984:
3981:
3979:
3978:Data scraping
3976:
3974:
3971:
3969:
3966:
3964:
3961:
3959:
3956:
3954:
3951:
3949:
3948:Cryptojacking
3946:
3944:
3941:
3939:
3936:
3934:
3931:
3929:
3926:
3924:
3921:
3919:
3916:
3914:
3911:
3907:
3904:
3902:
3899:
3897:
3894:
3892:
3889:
3888:
3886:
3884:
3881:
3879:
3876:
3874:
3871:
3869:
3866:
3865:
3863:
3861:
3857:
3849:
3839:
3836:
3834:
3831:
3829:
3826:
3824:
3821:
3819:
3816:
3814:
3811:
3809:
3806:
3804:
3801:
3799:
3796:
3794:
3791:
3787:
3784:
3782:
3779:
3778:
3777:
3774:
3772:
3769:
3767:
3764:
3763:
3761:
3757:
3753:
3746:
3741:
3739:
3734:
3732:
3727:
3726:
3723:
3717:
3714:
3713:
3692:
3688:
3684:
3678:
3662:
3658:
3657:
3652:
3645:
3638:
3637:Ballard Spahr
3634:
3630:
3627:
3622:
3620:
3612:
3611:pcpitstop.com
3608:
3604:
3601:
3595:
3588:
3584:
3580:
3577:
3571:
3555:
3551:
3547:
3540:
3532:
3528:
3526:
3521:
3514:
3507:
3494:
3490:
3484:
3473:
3466:
3459:
3452:
3448:
3445:
3444:
3437:
3430:
3426:
3422:
3419:
3418:
3413:
3412:
3408:
3405:
3399:
3393:
3387:
3380:
3376:
3372:
3369:
3363:
3356:
3352:
3348:
3345:
3340:
3333:
3329:
3325:
3322:
3316:
3309:
3305:
3302:
3296:
3290:July 28, 2004
3289:
3285:
3281:
3278:
3272:
3265:
3261:
3257:
3254:
3248:
3241:
3237:
3233:
3230:
3224:
3208:
3204:
3203:
3198:
3191:
3181:
3174:
3170:
3167:
3161:
3146:
3145:
3140:
3133:
3117:
3113:
3112:
3111:VICE Magazine
3107:
3100:
3098:
3081:
3077:
3073:
3067:
3051:
3047:
3046:
3041:
3034:
3032:
3020:September 22,
3016:
3012:
3008:
3004:
2997:
2981:
2977:
2971:
2955:
2951:
2945:
2938:
2934:
2930:
2927:
2921:
2914:
2910:
2909:archive.today
2906:
2903:
2897:
2881:
2877:
2873:
2867:
2860:
2855:
2848:
2844:
2840:
2837:
2832:
2825:
2821:
2818:
2812:
2805:
2801:
2797:
2794:
2788:
2781:
2777:
2774:
2769:
2753:
2749:
2745:
2738:
2731:
2727:
2723:
2720:
2714:
2707:
2706:
2702:
2699:
2692:
2685:
2681:
2677:
2674:
2668:
2652:
2648:
2644:
2637:
2628:
2624:
2617:
2609:
2605:
2601:
2597:
2590:
2583:
2579:
2576:
2570:
2562:
2558:
2553:
2548:
2544:
2540:
2535:
2530:
2526:
2522:
2518:
2511:
2495:
2491:
2490:
2485:
2478:
2462:
2458:
2457:
2452:
2445:
2429:
2425:
2421:
2415:
2408:
2404:
2401:
2395:
2379:
2375:
2371:
2364:
2348:
2344:
2340:
2333:
2327:
2323:
2320:
2315:
2308:
2304:
2301:
2295:
2287:
2283:
2279:
2275:
2268:
2260:
2256:
2252:
2248:
2244:
2240:
2236:
2232:
2228:
2221:
2213:
2209:
2205:
2201:
2196:
2191:
2188:(3): 237125.
2187:
2183:
2179:
2172:
2170:
2150:
2143:
2137:
2131:
2127:
2123:
2119:
2113:
2106:
2102:
2098:
2095:
2089:
2087:
2079:
2075:
2071:
2067:
2064:
2058:
2052:
2048:
2044:
2040:
2034:
2027:
2023:
2019:
2016:
2010:
2003:
1997:
1986:
1979:
1973:
1957:
1953:
1952:Bloomberg.com
1949:
1943:
1939:
1929:
1926:
1924:
1921:
1919:
1916:
1914:
1911:
1909:
1906:
1904:
1901:
1899:
1896:
1894:
1891:
1889:
1886:
1884:
1882:
1878:
1877:
1871:
1869:
1865:
1861:
1857:
1851:
1849:
1844:
1838:
1828:
1826:
1821:
1817:
1813:
1809:
1799:
1797:
1796:Mercedes-Benz
1793:
1792:Dell Computer
1789:
1785:
1780:
1778:
1773:
1771:
1767:
1766:Eliot Spitzer
1764:
1760:
1750:
1741:
1739:
1734:
1729:
1727:
1723:
1719:
1704:
1702:
1697:
1695:
1691:
1686:
1684:
1680:
1676:
1672:
1667:
1665:
1661:
1657:
1653:
1648:
1645:
1641:
1638:, the U.K.'s
1637:
1633:
1618:
1615:
1609:
1606:
1604:
1601:
1599:
1596:
1594:
1591:
1589:
1588:SpywareStrike
1586:
1584:
1583:Spyware Quake
1581:
1579:
1576:
1574:
1571:
1569:
1566:
1564:
1561:
1559:
1556:
1554:
1551:
1549:
1546:
1544:
1541:
1539:
1535:
1534:AntiVirus 360
1532:
1531:
1529:
1525:
1523:
1519:
1513:
1509:
1499:
1497:
1493:
1489:
1485:
1475:
1473:
1466:
1456:
1454:
1450:
1440:
1438:
1428:
1425:
1416:
1414:
1409:
1404:
1402:
1398:
1395:
1391:
1388:
1384:
1381:
1377:
1367:
1364:
1359:
1357:
1353:
1349:
1345:
1344:chat sessions
1341:
1331:
1329:
1325:
1321:
1316:
1311:
1309:
1305:
1301:
1297:
1293:
1289:
1288:
1283:
1282:180 Solutions
1268:
1264:
1262:
1258:
1254:
1249:
1247:
1246:
1241:
1237:
1233:
1229:
1224:
1222:
1218:
1217:Google Chrome
1214:
1210:
1206:
1196:
1194:
1188:
1186:
1181:
1177:
1175:
1171:
1167:
1163:
1159:
1150:
1147:
1143:
1139:
1135:
1134:
1133:
1125:
1122:
1120:
1115:
1111:
1107:
1103:
1098:
1096:
1092:
1088:
1087:
1083:acquired the
1082:
1078:
1077:
1072:
1071:
1067:, Lavasoft's
1066:
1060:
1050:
1048:
1044:
1039:
1034:
1024:
1022:
1018:
1017:Windows Vista
1013:
1011:
1007:
1003:
999:
998:administrator
995:
991:
987:
982:
979:
975:
973:
969:
965:
960:
957:
953:
948:
945:
933:
930:
922:
919:December 2018
912:
908:
904:
898:
897:
896:single source
892:This section
890:
881:
880:
872:
870:
866:
863:
859:
854:
852:
847:
845:
841:
837:
827:
825:
821:
817:
813:
812:
807:
803:
799:
798:
792:
790:
784:
782:
777:
772:
767:
765:
761:
757:
753:
748:
746:
742:
738:
733:
731:
727:
721:
719:
715:
711:
707:
703:
699:
695:
685:
682:
677:
672:
670:
666:
662:
658:
654:
650:
646:
641:
638:
634:
630:
625:
620:
618:
614:
613:
612:Reader Rabbit
608:
604:
600:
596:
592:
588:
584:
580:
576:
566:
564:
560:
555:
553:
549:
545:
541:
537:
533:
529:
518:
513:
511:
506:
504:
499:
498:
496:
495:
488:
487:
483:
481:
480:
476:
474:
471:
469:
468:
464:
463:
457:
456:
449:
445:
442:
439:
436:
433:
430:
427:
424:
421:
418:
416:
413:
411:
408:
407:
404:
399:
398:
391:
388:
386:
383:
381:
378:
377:
374:
369:
368:
361:
358:
356:
353:
351:
348:
346:
343:
341:
338:
336:
333:
331:
328:
326:
323:
321:
318:
316:
313:
311:
308:
306:
303:
301:
298:
296:
293:
292:
289:
284:
283:
276:
273:
271:
268:
267:
264:
259:
258:
251:
250:Vulnerability
248:
246:
243:
241:
238:
236:
233:
231:
228:
227:
224:
223:Hacking tools
219:
218:
211:
210:Script kiddie
208:
206:
203:
201:
198:
197:
194:
189:
188:
181:
178:
176:
173:
171:
168:
166:
163:
161:
158:
156:
153:
151:
148:
147:
144:
139:
138:
129:
126:
124:
121:
119:
116:
115:
114:
110:
108:
107:Maker culture
105:
103:
100:
98:
95:
93:
92:
88:
86:
83:
82:
79:
75:
70:
69:
62:
59:
57:
54:
52:
49:
47:
44:
43:
40:
35:
34:
31:
28:
27:
23:
22:
19:
4941:Trojan horse
4935:
4870:File sharing
4832:Postcardware
4820:Donationware
4795:Crowdfunding
4742:License-free
4503:
4418:Trojan horse
4398:Clickjacking
4244:Data masking
4094:
3803:Cyberwarfare
3695:. Retrieved
3686:
3677:
3667:February 19,
3665:. Retrieved
3654:
3644:
3610:
3594:
3586:
3570:
3560:September 4,
3558:. Retrieved
3549:
3539:
3531:the original
3523:
3513:
3504:
3499:September 4,
3497:. Retrieved
3493:the original
3483:
3472:the original
3458:
3442:
3436:
3416:
3402:
3398:
3386:
3378:
3362:
3354:
3339:
3331:
3315:
3295:
3287:
3271:
3263:
3247:
3239:
3223:
3211:. Retrieved
3207:the original
3200:
3190:
3180:
3160:
3150:September 4,
3148:. Retrieved
3142:
3132:
3120:. Retrieved
3116:the original
3109:
3084:. Retrieved
3080:the original
3075:
3066:
3054:. Retrieved
3043:
3018:. Retrieved
3006:
2996:
2984:. Retrieved
2980:the original
2970:
2960:November 21,
2958:. Retrieved
2954:the original
2944:
2936:
2920:
2912:
2896:
2884:. Retrieved
2880:the original
2875:
2866:
2854:
2846:
2831:
2811:
2804:Mark's Blog,
2803:
2787:
2768:
2756:. Retrieved
2747:
2737:
2730:SunbeltBLOG,
2729:
2713:
2696:
2691:
2683:
2667:
2655:. Retrieved
2651:the original
2647:Spyware Loop
2646:
2636:
2627:the original
2616:
2599:
2595:
2589:
2569:
2527:(15): 5765.
2524:
2520:
2510:
2500:December 21,
2498:. Retrieved
2494:the original
2487:
2477:
2467:December 21,
2465:. Retrieved
2461:the original
2454:
2444:
2434:December 21,
2432:. Retrieved
2423:
2414:
2394:
2382:. Retrieved
2373:
2363:
2351:. Retrieved
2343:Ars Technica
2342:
2332:
2314:
2298:Basil Cupa,
2294:
2280:(5): 25–29.
2277:
2273:
2267:
2234:
2230:
2220:
2185:
2181:
2156:. Retrieved
2149:the original
2136:
2121:
2112:
2104:
2077:
2073:
2057:
2042:
2033:
2025:
2009:
1996:
1985:the original
1972:
1960:. Retrieved
1951:
1942:
1888:Cyber spying
1881:Cuckoo's egg
1880:
1855:
1852:
1841:In the 2010
1840:
1805:
1781:
1774:
1756:
1747:
1730:
1715:
1698:
1687:
1682:
1668:
1649:
1643:
1629:
1626:Criminal law
1621:Legal issues
1616:
1613:
1608:WorldAntiSpy
1526:
1515:
1481:
1468:
1446:
1437:HTTP cookies
1434:
1422:
1413:phoning home
1405:
1401:class-action
1373:
1360:
1337:
1312:
1302:, a form of
1299:
1290:has dubbed "
1285:
1279:
1271:Applications
1265:
1250:
1243:
1225:
1202:
1189:
1182:
1178:
1155:
1131:
1123:
1099:
1090:
1084:
1074:
1068:
1062:
1040:
1036:
1014:
996:and use non-
983:
976:
961:
949:
940:
925:
916:
893:
855:
851:Trojan horse
848:
833:
823:
809:
795:
793:
788:
785:
770:
768:
756:anti-spyware
749:
745:web browsers
736:
734:
722:
698:web tracking
691:
673:
642:
621:
610:
594:
590:
572:
556:
552:web tracking
535:
527:
526:
484:
477:
465:
460:Publications
319:
305:Trojan horse
270:HackThisSite
89:
18:
5051:Product key
4981:End-of-life
4976:Abandonware
4926:Infostealer
4875:On-premises
4790:Crippleware
4747:Proprietary
4730:Open source
4550:Macro virus
4535:iOS malware
4509:Web threats
4469:Infostealer
4386:Concealment
4184:Misuse case
4018:Infostealer
3993:Email fraud
3958:Data breach
3793:Cybergeddon
3429:IEEE Xplore
3213:November 5,
2158:February 5,
2105:Pcworld.com
1903:Infostealer
1868:screenshots
1860:Photo Booth
1761:and former
1662:text of an
1644:prima facie
1578:SpyShredder
1496:Citizen Lab
1492:journalists
1453:pornography
1424:Stalkerware
1397:Greg Abbott
1304:click fraud
1296:Ben Edelman
1245:Marketscore
1236:web proxies
1207:other than
1205:web browser
1164:files, and
1070:Ad-Aware SE
718:web beacons
559:advertising
532:portmanteau
473:Hacker News
360:Infostealer
143:Conferences
97:Hackerspace
5086:Categories
4958:Shovelware
4931:Ransomware
4895:Sneakernet
4574:Protection
4489:Ransomware
4454:Fleeceware
4249:Encryption
4125:Web shells
4065:Ransomware
4013:Hacktivism
3776:Cybercrime
3506:computers.
3379:InfoWorld,
3275:Hu, Jim. "
3122:August 25,
2602:: 90–105.
1962:August 25,
1934:References
1883:(metaphor)
1864:video chat
1843:WebcamGate
1831:WebcamGate
1820:PC Pitstop
1816:defamation
1808:pejorative
1694:Washington
1679:common law
1573:Spysheriff
1543:MacSweeper
1522:banner ads
1506:See also:
1348:user names
1328:chargeware
1257:hosts file
1211:, such as
1185:HijackThis
1142:anti-virus
1057:See also:
1043:backing up
1031:See also:
1008:, such as
1002:privileges
978:Keyloggers
844:exploiting
781:policeware
726:keyloggers
710:keyloggers
669:JavaScript
597:meant for
330:Logic bomb
325:Ransomware
102:Hacktivism
5137:Deception
5006:Vaporware
4953:Scareware
4849:Trialware
4837:Shareware
4499:Scareware
4449:Crimeware
4080:Shellcode
4075:Scareware
3923:Crimeware
3883:Backdoors
3656:USA Today
3550:USA Today
3264:zdnet.com
3240:PC World,
3015:1059-1028
2986:April 28,
2847:BBC News,
2758:March 19,
2543:1424-8220
2424:PressPass
2374:CNet News
2251:1059-8405
2227:"Spyware"
2204:1550-1477
2142:"SPYWARE"
1918:Superfish
1753:Civil law
1720:has sued
1656:shareware
1568:Spylocked
1558:Spy Wiper
1548:Pest Trap
1484:NSO Group
1443:Shameware
1352:passwords
1292:stealware
1261:shareware
1253:firewalls
1232:firewalls
1193:safe mode
1152:schedule.
1081:Microsoft
1006:processes
964:firewalls
911:citations
903:talk page
659:that all
603:Zone Labs
599:espionage
583:Microsoft
538:) is any
448:Blue team
440:(defunct)
434:(defunct)
428:(defunct)
422:(defunct)
410:Anonymous
350:Web shell
200:Crimeware
180:Summercon
128:White hat
118:Black hat
111:Types of
85:Hackathon
46:Phreaking
4815:Careware
4805:Freeware
4800:Freemium
4710:Beerware
4702:Licenses
4647:Honeypot
4606:Firewall
4393:Backdoor
4254:Firewall
4159:Defenses
4085:Spamming
4070:Rootkits
4043:Phishing
4003:Exploits
3697:July 29,
3691:Archived
3687:CBS NEWS
3661:Archived
3629:Archived
3603:Archived
3587:News.com
3579:Archived
3554:Archived
3447:Archived
3421:Archived
3407:Archived
3371:Archived
3347:Archived
3324:Archived
3304:Archived
3288:news.com
3280:Archived
3256:Archived
3232:Archived
3169:Archived
3086:June 20,
3056:July 19,
3050:Archived
2929:Archived
2905:Archived
2886:June 13,
2839:Archived
2820:Archived
2796:Archived
2776:Archived
2752:Archived
2722:Archived
2701:Archived
2676:Archived
2657:July 27,
2578:Archived
2561:35957337
2428:Archived
2403:Archived
2384:March 7,
2378:Archived
2353:June 15,
2347:Archived
2322:Archived
2303:Archived
2259:15469380
2212:12611804
2126:Archived
2097:Archived
2066:Archived
2047:Archived
2026:News.com
2018:Archived
1956:Archived
1913:Phishing
1874:See also
1825:greyware
1660:legalese
1603:WinFixer
1383:rootkits
1106:PC Tools
1102:Symantec
802:Facebook
752:Facebook
714:rootkits
688:Overview
681:registry
665:exploits
595:software
540:software
444:Red team
300:Backdoor
175:ShmooCon
123:Grey hat
5092:Spyware
4936:Spyware
4921:Malware
4842:Nagware
4504:Spyware
4413:Rootkit
4342:Malware
4095:Spyware
4038:Payload
4033:Malware
3973:Viruses
3953:Botnets
3860:Threats
3076:Reuters
2552:9371186
2521:Sensors
2080:. 2005.
1908:Malware
1757:Former
1716:The US
1675:caselaw
1652:consent
1563:Spydawn
1553:PSGuard
1385:in its
1221:ActiveX
1174:ActiveX
1146:network
952:malware
862:Windows
816:Twitter
771:govware
737:spyware
702:trojans
661:ActiveX
653:ActiveX
643:Before
637:browser
591:Spyware
575:spyware
569:History
548:malware
544:privacy
528:Spyware
432:LulzSec
320:Spyware
295:Rootkit
288:Malware
240:Payload
230:Exploit
160:DEF CON
113:hackers
39:History
4773:Adware
4479:Malbot
4444:Botnet
4439:Adware
4344:topics
4289:(SIEM)
4266:(HIDS)
4150:Zombie
3887:Bombs
3868:Adware
3525:Yahoo!
3013:
2559:
2549:
2541:
2257:
2249:
2210:
2202:
2076:&
1848:LANrev
1784:liable
1777:Claria
1536:&
1472:Claria
1298:terms
1114:Sophos
1110:McAfee
1015:Since
820:Google
789:per se
716:, and
700:, and
694:adware
617:Mattel
579:Usenet
563:issues
486:Phrack
403:Groups
335:Botnet
275:Zone-H
4135:Worms
4130:Wiper
4048:Voice
3896:Logic
3475:(PDF)
3468:(PDF)
3144:eWeek
3007:Wired
2937:CNET,
2208:S2CID
2152:(PDF)
2145:(PDF)
1988:(PDF)
1981:(PDF)
1846:with
1812:libel
1671:EULAs
1518:rogue
1226:Some
836:virus
310:Virus
78:ethic
5011:list
4946:Worm
4725:Free
3901:Time
3891:Fork
3699:2013
3669:2010
3562:2008
3527:News
3501:2008
3440:See
3390:See
3215:2011
3202:CNET
3152:2008
3124:2016
3088:2017
3058:2021
3022:2022
3011:ISSN
2988:2013
2962:2014
2888:2006
2760:2018
2659:2013
2557:PMID
2539:ISSN
2502:2020
2469:2020
2436:2020
2386:2011
2355:2017
2255:PMID
2247:ISSN
2200:ISSN
2160:2016
1964:2020
1856:e.g.
1814:and
1794:and
1692:and
1690:Iowa
1510:and
1490:and
1378:was
1361:The
1234:and
1228:ISPs
1112:and
966:and
840:worm
674:The
534:for
345:HIDS
315:Worm
76:and
3906:Zip
3609:".
3585:".
3330:".
3286:".
3262:".
2682:".
2604:doi
2547:PMC
2529:doi
2282:doi
2239:doi
2190:doi
2120:".
2103:".
2072:".
2041:".
2024:".
1862:or
1733:FTC
1387:XCP
1356:FBI
1215:or
944:CPU
838:or
667:in
624:AOL
585:'s
530:(a
355:RCE
5088::
3685:.
3659:.
3653:.
3618:^
3552:.
3548:.
3522:.
3503:.
3377:.
3353:.
3238:.
3199:.
3141:.
3108:.
3096:^
3074:.
3048:.
3042:.
3030:^
3009:.
3005:.
2935:,
2911:,
2874:.
2845:,
2802:,
2750:.
2746:.
2728:,
2645:.
2600:52
2598:.
2555:.
2545:.
2537:.
2525:22
2523:.
2519:.
2486:.
2453:.
2422:.
2376:.
2372:.
2345:.
2341:.
2276:.
2253:.
2245:.
2235:20
2233:.
2229:.
2206:.
2198:.
2186:10
2184:.
2180:.
2168:^
2085:^
1950:.
1498:.
1358:.
1350:,
1346:,
1160:,
1108:,
1104:,
1097:.
1012:.
712:,
589:.
446:/
4686:e
4679:t
4672:v
4334:e
4327:t
4320:v
3744:e
3737:t
3730:v
3701:.
3671:.
3598:"
3564:.
3431:.
3319:"
3251:"
3217:.
3154:.
3126:.
3090:.
3060:.
3024:.
2990:.
2964:.
2890:.
2762:.
2661:.
2610:.
2606::
2563:.
2531::
2504:.
2471:.
2438:.
2388:.
2357:.
2288:.
2284::
2278:6
2261:.
2241::
2214:.
2192::
2162:.
2061:"
1966:.
1411:"
932:)
926:(
921:)
917:(
899:.
516:e
509:t
502:v
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.