Rudxain (talk | contribs)
m link AI-training; lowercase AI (non-acronym)
Rudxain (talk | contribs)
m link: adware, keylog, rootkit
Line 50: Line 50:
==Types(illegal/malware)==
==Types(illegal/malware)==


#Adware: This type of spyware monitors user activity to then sell that data to malicious advertisers.
#[[wikipedia:Adware|Adware]]: This type of spyware monitors user activity to then sell that data to malicious advertisers.
#Info-stealer: This type of spyware takes data from the device, such as recent actions, applications, etc.
#Info-stealer: This type of spyware takes data from the device, such as recent actions, applications, etc.
#Key-loggers: Key-loggers are a type of Info-stealer that gains access to data by observing keystrokes done by a user on an infected machine(This data is then saved onto an encrypted log file).
#[[wikipedia:Keystroke_logging|Key-loggers]]: Key-loggers are a type of Info-stealer that gains access to data by observing keystrokes done by a user on an infected machine(This data is then saved onto an encrypted log file).
#Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level).<ref name=":1">{{Cite web |title=What Is Spyware? Definition, Types, And Protection |url=https://www.fortinet.com/resources/cyberglossary/spyware |archive-url=https://web.archive.org/web/20251213081639/https://www.fortinet.com/resources/cyberglossary/spyware |archive-date=13 Dec 2025 |access-date=19 Jan 2026 |website=Fortinet.com |type=Uses text to communicate information(with some additional imagery)}}</ref>
#[[wikipedia:Rootkit|Rootkits]]: Rootkits allow infiltrators extreme levels of access to a device(around administrator level).<ref name=":1">{{Cite web |title=What Is Spyware? Definition, Types, And Protection |url=https://www.fortinet.com/resources/cyberglossary/spyware |archive-url=https://web.archive.org/web/20251213081639/https://www.fortinet.com/resources/cyberglossary/spyware |archive-date=13 Dec 2025 |access-date=19 Jan 2026 |website=Fortinet.com |type=Uses text to communicate information(with some additional imagery)}}</ref>


==Methods used by companies (legal)==
==Methods used by companies (legal)==