Wednesday, October 23, 2019

Word of the Day: spyware

 
Word of the Day WhatIs.com
Daily updates on the latest technology terms | October 23, 2019
spyware

Spyware is software that is installed on a computing device without the end user's knowledge. Any software can be classified as spyware if it is downloaded without the user's authorization.

Spyware is typically delivered through infected websites, free mobile or desktop apps and email attachments. Once installed, spyware runs silently in the background, collecting the information it was designed to gather.

 

Types of spyware include the following:


Keyloggers - can monitor and record each keystroke typed on a keyboard.

 

Password stealers - will capture stored passwords.

 

Banking Trojans - can steal payment data, credentials and funds from victims' bank accounts.

 

Infostealers - are designed to capture and record browser history, cookies and information in targeted files.

 

Browser hijackers - can modify web browser settings without the user's permission and redirect the user to websites the user had not intended to visit.

 

Commercial spyware - is often marketed as "parental control" or "employee monitoring" software.

 

Spyware can be difficult to detect; often, the first indication that a user has been infected with spyware is a noticeable reduction in network connection speeds, battery life or bank account balance.

 

To prevent spyware from being installed, users should create strong passwords, only download software from trusted sources, read all clickwrap agreements when installing software and regularly update all operating systems, web browsers and software apps -- especially anti-virus applications.

Quote of the Day

 
"WhatsApp, a third-party messaging app, has experienced two major vulnerabilities this year. The first vulnerability allowed attackers to install spyware on a device simply by calling it, even if the user didn't answer, and the user wouldn't receive a missed call notification." - Colm Warner

Learning Center

 

Malware detection methods struggle to keep up with evolving threats
Experts discuss the increasingly complex methods of malware detection needed when dealing with everything from low-level attackers to advanced persistent threat groups.

Broken WannaCry variants continuing to spread
Researchers are still seeing surprisingly high WannaCry detection rates and they worry this points to high risks because systems still aren't being patched against threats.

Chronicle: Crimeware group takedowns 'increasingly ineffectual'
Law enforcement takedowns of cybercrime operations may not be producing the desired results, according to an extensive, five-year study from Alphabet Inc.'s Chronicle.

Cyber criminals tap into web social engineering toolkit
Security researchers have discovered a web social engineering toolkit that enables cyber criminals to create fake update notification campaigns.

Quiz Yourself

 
Web-borne malware Security School quiz
In this 6-question quiz, test your knowledge of Pete Lindstrom's Security School lesson on Web-borne malware.

Stay in Touch

 
For feedback about any of our definitions or to suggest a new definition, please contact us at: editor@whatIs.com

FOLLOW US

TwitterRSS
About This E-Newsletter
The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: