Spyware: Difference between revisions
Added more links to "See also" and added some information in "Spyware & Data Collection from a Consumer Rights Perspective"(may need more citations in the future!) |
m Added 2 citations |
||
| Line 3: | Line 3: | ||
Spyware is a form of malware designed to gather information from the infected device. Spyware comes in many different shapes and forms and may be installed intentionally or unintentionally.<ref name=":1" /> | Spyware is a form of malware designed to gather information from the infected device. Spyware comes in many different shapes and forms and may be installed intentionally or unintentionally.<ref name=":1" /> | ||
There is considerable debate over the scope of the term malware; while some people and groups qualify certain non-malware software as spyware, such as [[Microsoft]], [[Meta]], and [[Google]]<ref name=":0">{{Cite web |last=Petrino |first=Gene |title=The Data Big Tech Companies Have On You |url=https://www.security.org/resources/data-tech-companies-have/ | There is considerable debate over the scope of the term malware; while some people and groups qualify certain non-malware software as spyware, such as [[Microsoft]], [[Meta]], and [[Google]]<ref name=":0">{{Cite web |last=Petrino |first=Gene |title=The Data Big Tech Companies Have On You |url=https://www.security.org/resources/data-tech-companies-have/ |access-date=21 August 2025 |website=security.org |type=Uses text to communicate information(with some additional imagery)}}</ref> owned software due to the large quantity of data these corporations collect from its users, others disagree with that qualification, due to the user having technically consented to the data collection. | ||
==How it works== | ==How it works== | ||
| Line 10: | Line 10: | ||
Malware with deeper level access to your device has more potential for harm, which is a reason some are cautious of [[Kernel level driver|Kernel Level Drivers]]. | Malware with deeper level access to your device has more potential for harm, which is a reason some are cautious of [[Kernel level driver|Kernel Level Drivers]]. | ||
Some "free" services, such as [[Google]] services(check here for more info: [[List of Google products]]), often come at the cost of user data being collected to be sold for profit and/or to be used as training data for [[Artificial intelligence]].<ref>{{Cite web | Some "free" services, such as [[Google]] services(check here for more info: [[List of Google products]]), often come at the cost of user data being collected to be sold for profit and/or to be used as training data for [[Artificial intelligence]].<ref>{{Cite web |date=16 Feb 2022 |title=What Does Big Tech Actually Do With Your Data? |url=https://www.forbes.com/councils/forbestechcouncil/2022/02/16/what-does-big-tech-actually-do-with-your-data/ |access-date=31 Jan 2026 |website=forbes.com}}</ref> | ||
The Legally collected data may also just be diagnostic data or just a way to make things "more convenient"(like with cookies). | The Legally collected data may also just be diagnostic data or just a way to make things "more convenient"(like with cookies). | ||
| Line 31: | Line 31: | ||
==Why it is a problem== | ==Why it is a problem== | ||
Spyware, as the name suggest, spies on the device, which contains the user's data. Spyware is inherently negative for users' privacy. As companies like [[Microsoft]], [[Meta]] and [[Google]] are collecting more information on consumers(either by legal or illegal means), they make users less secure & more susceptible to data breaches/leaks.<ref>{{Cite web |date=2 Jan 2026 |title=Data Breaches 2025: Biggest Cybersecurity Incidents So Far |url=https://www.pkware.com/blog/recent-data-breaches | Spyware, as the name suggest, spies on the device, which contains the user's data. Spyware is inherently negative for users' privacy. As companies like [[Microsoft]], [[Meta]] and [[Google]] are collecting more information on consumers(either by legal or illegal means), they make users less secure & more susceptible to data breaches/leaks.<ref>{{Cite web |date=2 Jan 2026 |title=Data Breaches 2025: Biggest Cybersecurity Incidents So Far |url=https://www.pkware.com/blog/recent-data-breaches |access-date=31 Jan 2026 |website=pkware.com}}</ref> | ||
===Spyware & Data Collection from a Consumer Rights Perspective:=== | ===Spyware & Data Collection from a Consumer Rights Perspective:=== | ||
| Line 41: | Line 41: | ||
For example, a usage of [[Deceptive language frequently used against consumers]] or simply hiding things in the terms of service may be enough trick a consumer into thinking there is nothing wrong with the service or may be enough to prevent/discourage a consumer from learning what a company does with their data & what data they collect. | For example, a usage of [[Deceptive language frequently used against consumers]] or simply hiding things in the terms of service may be enough trick a consumer into thinking there is nothing wrong with the service or may be enough to prevent/discourage a consumer from learning what a company does with their data & what data they collect. | ||
==== Lack of a consumers control: ==== | ====Lack of a consumers control:==== | ||
Many corporations use [[Forced arbitration]] or [[Consent-or-pay]] in order to gain access to user data, with the main incentive/goal of doing this being a desire to make profit(which is why many companies are okay with users opting out of data collection as long as the users still pay for the service as found in [[Consent-or-pay]]). | Many corporations use [[Forced arbitration]] or [[Consent-or-pay]] in order to gain access to user data, with the main incentive/goal of doing this being a desire to make profit(which is why many companies are okay with users opting out of data collection as long as the users still pay for the service as found in [[Consent-or-pay]]).<ref>{{Cite web |date=28 Oct 2024 |title=Forced Arbitration Clauses: What’s at Stake and Why it Matters |url=https://blog.helmerfriedman.com/forced-arbitration-clauses-whats-at-stake-and-why-it-matters/ |access-date=31 Jan 2026 |website=}}</ref><ref>{{Cite web |date=21 Aug 2025 |title=Consent or Pay Models: Are Paywall Cookie Consent Legal For Site? |url=https://wplegalpages.com/blog/consent-or-pay-models/ |access-date=31 Jan 2026}}</ref> | ||
====The need for consumer control and proper disclosure:==== | ====The need for consumer control and proper disclosure:==== | ||
Reasons/arguments include: | Reasons/arguments include: | ||
* Improved user satisfaction | *Improved user satisfaction | ||
* The ability to opt-out allows users to prevent their sensitive data from being leaked in the event of a data breach | *The ability to opt-out allows users to prevent their sensitive data from being leaked in the event of a data breach | ||
* The option for consumers to properly see the data being collected allows them to more easily infer what data tends to be collected without intentionally confusing language | *The option for consumers to properly see the data being collected allows them to more easily infer what data tends to be collected without intentionally confusing language | ||
==Types(Illegal/Malware)<ref name=":1">{{Cite web |title=What Is Spyware? Definition, Types, And Protection |url=https://www.fortinet.com/resources/cyberglossary/spyware |access-date=19 Jan 2026 |website=Fortinet.com |type=Uses text to communicate information(with some additional imagery)}}</ref>== | ==Types(Illegal/Malware)<ref name=":1">{{Cite web |title=What Is Spyware? Definition, Types, And Protection |url=https://www.fortinet.com/resources/cyberglossary/spyware |access-date=19 Jan 2026 |website=Fortinet.com |type=Uses text to communicate information(with some additional imagery)}}</ref>== | ||
| Line 63: | Line 63: | ||
#Tracking Pixels: Tracking pixels are incredibly small images that are embedded into websites or emails. This method allows companies to see how users interact with their content on the web. | #Tracking Pixels: Tracking pixels are incredibly small images that are embedded into websites or emails. This method allows companies to see how users interact with their content on the web. | ||
#Accounts & Online Forms: Websites typically have users sign up with an account so they can tie data to it. Both account setup and forms similar to it tend to require data such as: Email addresses, phone numbers, Names, & sometimes data that should be optional(like your location). | #Accounts & Online Forms: Websites typically have users sign up with an account so they can tie data to it. Both account setup and forms similar to it tend to require data such as: Email addresses, phone numbers, Names, & sometimes data that should be optional(like your location). | ||
#Device & location tracking: Some websites will request access to your geographical position(which can be declined), but what tends to be collected more often are IP addresses( | #Device & location tracking: Some websites will request access to your geographical position(which can be declined), but what tends to be collected more often are IP addresses(usually outside of your control). | ||
==See also== | ==See also== | ||