Sign in with
Sign up | Sign in

Spyware Defined

Welcome to Your Worst Malware Nightmare
By

Spybot Search&Destroy combats spyware

The term spyware conjures mental images of rogue cold war agents veiled in secrecy subverting control of communications equipment to fulfill some evil agenda. Perhaps this was the original intent of whoever first introduced the term to computer culture but its use came to term around the mid 1990s. Today we know spyware as the catch-all term to categorize any sort of software program that monitors, collects and distributes information without explicit permission, knowledge or invocation.

Observable aspects of spyware infestation include:

  • personal Web or email client settings change unexpectedly
  • unwanted accessories or tool bars appear spontaneously
  • unsolicited advertisements crop up at random

Some less savory and less apparent aspects of spyware behavior include:

  • targeted data harvesting to collect personal or financial data
  • secretive backdoor capability to allow surreptitious reentry
  • complete or partial remote control over the infected computer

The Effects Of Spyware

Spyware is a costly form of malware, both in terms of time and money spent resolving the problems it causes. Most spyware is commercially produced and distributed, which explains why it has become such a pervasive form of malware. Ultimately, spyware can take away more than just time or money from infested end-users. Certain types of spyware are designed to steal ad revenue from legitimate sites or modify search queries by redirecting them to channels specified by the spyware's creator.

The various forms and implementations of spyware range from the generally frowned-upon to the outright illegal. A presumably benign form may collect statistical data on Website visits for marketing purposes - perhaps to formulate better target demographics for an upcoming campaign of adware or spam solicitations. Another form of spyware collects more than just statistical data, and harvests financial information, bank and credit card numbers, logon credentials and other personal information to redistribute to third-parties with bad intent. Ouch!

React To This Article