Spyware: Difference between revisions
removed incomplete |
added 2 more citations |
||
| Line 36: | Line 36: | ||
A lack of transparency on a consumers ability to opt-out of data collection if even possible is quite common among popular services | A lack of transparency on a consumers ability to opt-out of data collection if even possible is quite common among popular services | ||
For example, a usage of [[Deceptive language frequently used against consumers]] or simply hiding things in the terms of service may be enough trick a consumer into thinking there is nothing wrong with the service or may be enough to prevent/discourage a consumer from learning what a company does with their data & what data they collect. | For example, a usage of [[Deceptive language frequently used against consumers]] or simply hiding things in the terms of service may be enough trick a consumer into thinking there is nothing wrong with the service or may be enough to prevent/discourage a consumer from learning what a company does with their data & what data they collect.<ref>{{Cite web |last=Libbey |first=Madeline |last2=Micek |first2=Peter |last3=Cheng |first3=Sage |date= |title=Going dark: companies today release fewer transparency reports, less data |url=https://www.accessnow.org/going-dark-companies-today-release-fewer-transparency-reports-less-data/ |access-date=2026-02-01 |website=accessnow.org}}</ref> | ||
====Lack of a consumers control:==== | ====Lack of a consumers control:==== | ||
| Line 46: | Line 46: | ||
*Improved user satisfaction | *Improved user satisfaction | ||
*The ability to opt-out allows users to prevent their sensitive data from being leaked in the event of a data breach | *The ability to opt-out allows users to prevent their sensitive data from being leaked in the event of a data breach | ||
*The option for consumers to properly see the data being collected allows them to more easily infer what data tends to be collected without dealing with intentionally deceptive language | *The option for consumers to properly see the data being collected allows them to more easily infer what data tends to be collected without dealing with intentionally deceptive language<ref>{{Cite web |last=Podolsky |first=Michael |date=31 May 2024 |title=Why Prioritizing Consumer Rights Matters For Businesses |url=https://www.forbes.com/councils/forbesbusinesscouncil/2024/05/31/why-prioritizing-consumer-rights-matters-for-businesses/ |website=forbes.com}}</ref> | ||
==Types(illegal/malware) | ==Types(illegal/malware)== | ||
#Adware: This type of spyware monitors user activity to then sell that data to malicious advertisers. | #Adware: This type of spyware monitors user activity to then sell that data to malicious advertisers. | ||
#Info-stealer: This type of spyware takes data from the device, such as recent actions, applications, etc. | #Info-stealer: This type of spyware takes data from the device, such as recent actions, applications, etc. | ||
#Key-loggers: Key-loggers are a type of Info-stealer that gains access to data by observing keystrokes done by a user on an infected machine(This data is then saved onto an encrypted log file). | #Key-loggers: Key-loggers are a type of Info-stealer that gains access to data by observing keystrokes done by a user on an infected machine(This data is then saved onto an encrypted log file). | ||
#Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level). | #Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level).<ref name=":1">{{Cite web |title=What Is Spyware? Definition, Types, And Protection |url=https://www.fortinet.com/resources/cyberglossary/spyware |access-date=19 Jan 2026 |website=Fortinet.com |type=Uses text to communicate information(with some additional imagery)}}</ref> | ||
==Methods used by companies (legal) | ==Methods used by companies (legal)== | ||
#Cookies: Small pieces of data stored in files on your device(s). This type of data may include, but is not limited to: Preferences on websites, login information, & your browser history. | #Cookies: Small pieces of data stored in files on your device(s). This type of data may include, but is not limited to: Preferences on websites, login information, & your browser history. | ||
#Tracking Pixels: Tracking pixels are incredibly small images that are embedded into websites or emails. This method allows companies to see how users interact with their content on the web. | #Tracking Pixels: Tracking pixels are incredibly small images that are embedded into websites or emails. This method allows companies to see how users interact with their content on the web. | ||
#Accounts & Online Forms: Websites typically have users sign up with an account so they can tie data to it. Both account setup and forms similar to it tend to require data such as: Email addresses, phone numbers, Names, & sometimes data that should be optional(like your location). | #Accounts & Online Forms: Websites typically have users sign up with an account so they can tie data to it. Both account setup and forms similar to it tend to require data such as: Email addresses, phone numbers, Names, & sometimes data that should be optional(like your location). | ||
#Device & location tracking: Some websites will request access to your geographical position(which can be declined), but what tends to be collected more often are IP addresses(usually outside of your control). | #Device & location tracking: Some websites will request access to your geographical position(which can be declined), but what tends to be collected more often are IP addresses(usually outside of your control).<ref>{{Cite web |last=Davis |first=Lakisha |date=11 Apr 2025 |title=Data Harvesting 101: What Companies Know About You (And How They Use It) |url=https://metapress.com/data-harvesting-101-what-companies-know-about-you-and-how-they-use-it/ |access-date=20 Jan 2025 |website=metapress.com}}</ref> | ||
==See also== | ==See also== | ||