There is no clear border between spyware applications and Trojans, as such applications usually spread just like Trojans, and many times Trojans spy on the infected computers. Unlike computer viruses and worms, spyware applications do not auto-replicate, but they also exploit computers for commercial advantages. Spyware covers more that monitoring users
MALWARE HISTORY – SPYWARE, ADWARE and PHISHING
August 21, 2008
1 Min Read
Spyware applications are pieces of software that stealthily install and monitor users
You may also like
Bogdan BOTEZATU
Bogdan Botezatu is living his second childhood at Bitdefender as senior e-threat analyst. When he is not documenting sophisticated strains of malware or writing removal tools, he teaches extreme sports such as surfing the web without protection or rodeo with wild Trojan horses. He believes that most things in life can be beat with strong heuristics and that antimalware research is like working for a secret agency: you need to stay focused at all times, but you get all the glory when you catch the bad guys.
1 Comment
Click here to post a comment
Promo
1.4m
Fans Love us
Recent shouts
- Meurig Parri on Microsoft Ends Support for Windows 7. What You Need to Know
- Kevin on Cable Haunt vulnerability affects millions of Broadcom cable modems
- Terry on Ransomware attack forces Arkansas CEO to fire 300 employees days before Christmas
- Martin on 1&1 Telecom GmbH hit by almost €10 million GDPR fine over poor security at call centre
- Xander on 1&1 Telecom GmbH hit by almost €10 million GDPR fine over poor security at call centre
what was the first adware ever made and when was it made??