H0l0 (talk | contribs)
No edit summary
H0l0 (talk | contribs)
Added the "Types" section and added a 2nd citation. (I may work on this article more in the future btw)
Line 13: Line 13:
Spyware, as the name suggest, spies on the device, which contains the user's data. Spyware is inherently negative for users' privacy. As companies like [[Microsoft]], [[Meta]] and [[Google]] are doing this, it makes users less secure.
Spyware, as the name suggest, spies on the device, which contains the user's data. Spyware is inherently negative for users' privacy. As companies like [[Microsoft]], [[Meta]] and [[Google]] are doing this, it makes users less secure.


==Examples==
==Types==


* Adware: This type of spyware monitors user activity to then sell that data to malicious advertisers.
* Info-stealer: This type of spyware takes data from the device, such as recent actions, applications, etc.
* Key-loggers: Key-loggers are a type of Info-stealer that gains access to data by observing keystrokes done by a user on an infected machine(This data is then saved onto an encrypted log file).
* Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level). <ref>{{Cite web |title=What Is Spyware? Definition, Types, And Protection |url=https://www.fortinet.com/resources/cyberglossary/spyware |url-status=live |access-date=19 Jan 2026 |website=Fortinet.com |type=Privacy focused article; designed to inform readers about the dangers of spyware and how to protect themselves.}}</ref>


==References==
==References==