Spyware: Difference between revisions
No edit summary |
Added the "Types" section and added a 2nd citation. (I may work on this article more in the future btw) |
||
| Line 13: | Line 13: | ||
Spyware, as the name suggest, spies on the device, which contains the user's data. Spyware is inherently negative for users' privacy. As companies like [[Microsoft]], [[Meta]] and [[Google]] are doing this, it makes users less secure. | Spyware, as the name suggest, spies on the device, which contains the user's data. Spyware is inherently negative for users' privacy. As companies like [[Microsoft]], [[Meta]] and [[Google]] are doing this, it makes users less secure. | ||
== | ==Types== | ||
* Adware: This type of spyware monitors user activity to then sell that data to malicious advertisers. | |||
* Info-stealer: This type of spyware takes data from the device, such as recent actions, applications, etc. | |||
* Key-loggers: Key-loggers are a type of Info-stealer that gains access to data by observing keystrokes done by a user on an infected machine(This data is then saved onto an encrypted log file). | |||
* Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level). <ref>{{Cite web |title=What Is Spyware? Definition, Types, And Protection |url=https://www.fortinet.com/resources/cyberglossary/spyware |url-status=live |access-date=19 Jan 2026 |website=Fortinet.com |type=Privacy focused article; designed to inform readers about the dangers of spyware and how to protect themselves.}}</ref> | |||
==References== | ==References== | ||
Revision as of 00:44, 20 January 2026
⚠️ Article status notice: This article has been marked as incomplete
This article needs additional work for its sourcing and verifiability to meet the wiki's Content Guidelines and be in line with our Mission Statement for comprehensive coverage of consumer protection issues.
This notice will be removed once sufficient documentation has been added to establish the systemic nature of these issues. Once you believe the article is ready to have its notice removed, please visit the Moderator's noticeboard, or the discord and post to the #appeals channel.
Learn more ▼
Spyware is a form of malware designed to gather information from the infected device. Spyware comes in many different shapes and forms and may be installed intentionally or unintentionally.
In some circles, some may qualify non-malware software as spyware, such as Microsoft, Meta, and Google[1] owned software due to the large quantity of data these corporations collect from its users, though others disagree with that qualification, due to the user having technically consented to this espionage.
How it works
Spyware comes in many different forms. It may present itself as an actual software, while secretly spying on your device in the background.
Malware with deeper level access to your device has more potential for harm, which is a reason some are cautious of Kernel Level Drivers.
Why it is a problem
Spyware, as the name suggest, spies on the device, which contains the user's data. Spyware is inherently negative for users' privacy. As companies like Microsoft, Meta and Google are doing this, it makes users less secure.
Types
- Adware: This type of spyware monitors user activity to then sell that data to malicious advertisers.
- Info-stealer: This type of spyware takes data from the device, such as recent actions, applications, etc.
- Key-loggers: Key-loggers are a type of Info-stealer that gains access to data by observing keystrokes done by a user on an infected machine(This data is then saved onto an encrypted log file).
- Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level). [2]
References
- ↑ "The Data Big Tech Companies Have On You". Retrieved 21 August 2025.
- ↑ "What Is Spyware? Definition, Types, And Protection". Fortinet.com (Privacy focused article; designed to inform readers about the dangers of spyware and how to protect themselves.). Retrieved 19 Jan 2026.
{{cite web}}: CS1 maint: url-status (link)