Trinity (talk | contribs)
m Added archived reference links
removed invalid link at the start of the article (Mentioned invalid link was "malware")
 
(7 intermediate revisions by 3 users not shown)
Line 1: Line 1:
Spyware is a form of malware designed to gather information from the infected device. Spyware comes in many different shapes and forms and may be installed intentionally or unintentionally.<ref name=":1" />
[https://en.wikipedia.org/wiki/Spyware Spyware] is a form of '''malware''' designed to gather information from the infected device. Spyware comes in many different shapes and forms and may be installed intentionally or unintentionally.<ref name=":1" />


There is considerable debate over the scope of the term malware; while some people and groups qualify certain non-malware software as spyware, such as [[Microsoft]], [[Meta]], and [[Google]]<ref name=":0">{{Cite web |last=Petrino |first=Gene |title=The Data Big Tech Companies Have On You |url=https://www.security.org/resources/data-tech-companies-have/ |archive-url=https://archive.li/5V315 |archive-date=13 Oct 2022 |access-date=21 August 2025 |website=security.org |type=Uses text to communicate information(with some additional imagery)}}</ref> owned software due to the large quantity of data these corporations collect from its users, others disagree with that qualification, due to the user having technically consented to the data collection.
There is considerable debate over the scope of the term malware; while some people and groups qualify certain non-malware software as spyware, such as [[Microsoft]], [[Meta]], and [[Google]]<ref name=":0">{{Cite web |last=Petrino |first=Gene |title=The Data Big Tech Companies Have On You |url=https://www.security.org/resources/data-tech-companies-have/ |archive-url=http://web.archive.org/web/20260111171613/https://www.security.org/resources/data-tech-companies-have/ |archive-date=11 Jan 2026|access-date=21 August 2025 |website=security.org |type=Uses text to communicate information(with some additional imagery)}}</ref> owned software due to the large quantity of data these corporations collect from its users, others disagree with that qualification, due to the user having technically consented to the data collection.


==How it works==
==How it works==
Spyware comes in many different forms. It may present itself as an actual software, while secretly spying on your device in the background.  
Spyware comes in many different forms. It may present itself as an actual software, while secretly spying on your device in the background.  


Malware with deeper level access to your device has more potential for harm, which is a reason some are cautious of [[Kernel level driver|Kernel Level Drivers]].
Malware with deeper level access to your device has more potential for harm, which is a reason some are cautious of [[Kernel level driver|Kernel Level Drivers]] and [[Kernel level anti-cheats]].


Some "free" services, such as [[Google]] services(check here for more info: [[List of Google products]]), often come at the cost of user data being collected to be sold for profit and/or to be used as training data for [[Artificial intelligence]].<ref>{{Cite web |date=16 Feb 2022 |title=What Does Big Tech Actually Do With Your Data? |url=https://www.forbes.com/councils/forbestechcouncil/2022/02/16/what-does-big-tech-actually-do-with-your-data/ |archive-url=https://web.archive.org/web/20241206070801/https://www.forbes.com/councils/forbestechcouncil/2022/02/16/what-does-big-tech-actually-do-with-your-data/ |archive-date=6 Dec 2024 |access-date=31 Jan 2026 |website=forbes.com}}</ref>
Some "free" services, such as [[Google]] services(check here for more info: [[List of Google products]]), often come at the cost of user data being collected to be sold for profit and/or to be used as [[Artificial_intelligence/training|training data]] for [[artificial intelligence]].<ref>{{Cite web |date=16 Feb 2022 |title=What Does Big Tech Actually Do With Your Data? |url=https://www.forbes.com/councils/forbestechcouncil/2022/02/16/what-does-big-tech-actually-do-with-your-data/ |archive-url=https://web.archive.org/web/20241206070801/https://www.forbes.com/councils/forbestechcouncil/2022/02/16/what-does-big-tech-actually-do-with-your-data/ |archive-date=6 Dec 2024 |access-date=31 Jan 2026 |website=forbes.com}}</ref>


The Legally collected data may also just be diagnostic data or just a way to make things "more convenient"(like with cookies).
The legally collected data may also just be diagnostic data or just a way to make things "more convenient"(like with [[Web cookie|cookies]]).


===Data that tends to get collected:===
===Data that tends to get collected:===
Line 29: Line 29:


==Why it is a problem==
==Why it is a problem==
Spyware, as the name suggests, spies on the device, which contains the user's data. Spyware is inherently negative for users' privacy. As companies like [[Microsoft]], [[Meta]] and [[Google]] are collecting more information on consumers(either by legal or illegal means), they make users less secure & more susceptible to data breaches/leaks.<ref>{{Cite web |date=2 Jan 2026 |title=Data Breaches 2025: Biggest Cybersecurity Incidents So Far |url=https://www.pkware.com/blog/recent-data-breaches |archive-url=https://archive.ph/5Al2q |archive-date=3 Feb 2026 |access-date=31 Jan 2026 |website=pkware.com}}</ref>
Spyware, as the name suggests, spies on the device, which contains the user's data. Spyware is inherently negative for users' privacy. As companies like [[Microsoft]], [[Meta]] and [[Google]] are collecting more information on consumers(either by legal or illegal means), they make users less secure & more susceptible to data breaches/leaks.<ref>{{Cite web |date=2 Jan 2026 |title=Data Breaches 2025: Biggest Cybersecurity Incidents So Far |url=https://www.pkware.com/blog/recent-data-breaches |archive-url=http://web.archive.org/web/20260116190555/https://www.pkware.com/blog/recent-data-breaches |archive-date=16 Jan 2026|access-date=31 Jan 2026 |website=pkware.com}}</ref>


===Spyware & data collection from a consumer rights perspective:===
===Spyware & data collection from a consumer rights perspective:===
Line 50: Line 50:
==Types(illegal/malware)==
==Types(illegal/malware)==


#Adware: This type of spyware monitors user activity to then sell that data to malicious advertisers.
#[[wikipedia:Adware|Adware]]: This type of spyware monitors user activity to then sell that data to malicious advertisers.
#Info-stealer: This type of spyware takes data from the device, such as recent actions, applications, etc.
#Info-stealer: This type of spyware takes data from the device, such as recent actions, applications, etc.
#Key-loggers: Key-loggers are a type of Info-stealer that gains access to data by observing keystrokes done by a user on an infected machine(This data is then saved onto an encrypted log file).
#[[wikipedia:Keystroke_logging|Key-loggers]]: Key-loggers are a type of Info-stealer that gains access to data by observing keystrokes done by a user on an infected machine(This data is then saved onto an encrypted log file).
#Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level).<ref name=":1">{{Cite web |title=What Is Spyware? Definition, Types, And Protection |url=https://www.fortinet.com/resources/cyberglossary/spyware |archive-url=https://web.archive.org/web/20251213081639/https://www.fortinet.com/resources/cyberglossary/spyware |archive-date=13 Dec 2025 |access-date=19 Jan 2026 |website=Fortinet.com |type=Uses text to communicate information(with some additional imagery)}}</ref>
#[[wikipedia:Rootkit|Rootkits]]: Rootkits allow infiltrators extreme levels of access to a device(around administrator level).<ref name=":1">{{Cite web |title=What Is Spyware? Definition, Types, And Protection |url=https://www.fortinet.com/resources/cyberglossary/spyware |archive-url=https://web.archive.org/web/20251213081639/https://www.fortinet.com/resources/cyberglossary/spyware |archive-date=13 Dec 2025 |access-date=19 Jan 2026 |website=Fortinet.com |type=Uses text to communicate information(with some additional imagery)}}</ref>


==Methods used by companies (legal)==
==Methods used by companies (legal)==


#Cookies: Small pieces of data stored in files on your device(s). This type of data may include, but is not limited to: Preferences on websites, login information, & your browser history.
#[[Web_cookie|Cookies]]: Small pieces of data stored in files on your device(s). This type of data may include, but is not limited to: Preferences on websites, login information, & your browser history.
#Tracking Pixels: Tracking pixels are incredibly small images that are embedded into websites or emails. This method allows companies to see how users interact with their content on the web.
#Tracking Pixels: Tracking pixels are incredibly small images that are embedded into websites or emails. This method allows companies to see how users interact with their content on the web.
#Accounts & Online Forms: Websites typically have users sign up with an account so they can tie data to it. Both account setup and forms similar to it tend to require data such as: Email addresses, phone numbers, Names, & sometimes data that should be optional(like your location).
#Accounts & Online Forms: Websites typically have users sign up with an account so they can tie data to it. Both account setup and forms similar to it tend to require data such as: Email addresses, phone numbers, Names, & sometimes data that should be optional(like your location).