Spyware: Difference between revisions
m link AI-training; lowercase AI (non-acronym) |
m link: adware, keylog, rootkit |
||
| Line 50: | Line 50: | ||
==Types(illegal/malware)== | ==Types(illegal/malware)== | ||
#Adware: This type of spyware monitors user activity to then sell that data to malicious advertisers. | #[[wikipedia:Adware|Adware]]: This type of spyware monitors user activity to then sell that data to malicious advertisers. | ||
#Info-stealer: This type of spyware takes data from the device, such as recent actions, applications, etc. | #Info-stealer: This type of spyware takes data from the device, such as recent actions, applications, etc. | ||
#Key-loggers: Key-loggers are a type of Info-stealer that gains access to data by observing keystrokes done by a user on an infected machine(This data is then saved onto an encrypted log file). | #[[wikipedia:Keystroke_logging|Key-loggers]]: Key-loggers are a type of Info-stealer that gains access to data by observing keystrokes done by a user on an infected machine(This data is then saved onto an encrypted log file). | ||
#Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level).<ref name=":1">{{Cite web |title=What Is Spyware? Definition, Types, And Protection |url=https://www.fortinet.com/resources/cyberglossary/spyware |archive-url=https://web.archive.org/web/20251213081639/https://www.fortinet.com/resources/cyberglossary/spyware |archive-date=13 Dec 2025 |access-date=19 Jan 2026 |website=Fortinet.com |type=Uses text to communicate information(with some additional imagery)}}</ref> | #[[wikipedia:Rootkit|Rootkits]]: Rootkits allow infiltrators extreme levels of access to a device(around administrator level).<ref name=":1">{{Cite web |title=What Is Spyware? Definition, Types, And Protection |url=https://www.fortinet.com/resources/cyberglossary/spyware |archive-url=https://web.archive.org/web/20251213081639/https://www.fortinet.com/resources/cyberglossary/spyware |archive-date=13 Dec 2025 |access-date=19 Jan 2026 |website=Fortinet.com |type=Uses text to communicate information(with some additional imagery)}}</ref> | ||
==Methods used by companies (legal)== | ==Methods used by companies (legal)== | ||