Spyware: Difference between revisions
No edit summary |
Added the "Types" section and added a 2nd citation. (I may work on this article more in the future btw) |
||
| Line 13: | Line 13: | ||
Spyware, as the name suggest, spies on the device, which contains the user's data. Spyware is inherently negative for users' privacy. As companies like [[Microsoft]], [[Meta]] and [[Google]] are doing this, it makes users less secure. | Spyware, as the name suggest, spies on the device, which contains the user's data. Spyware is inherently negative for users' privacy. As companies like [[Microsoft]], [[Meta]] and [[Google]] are doing this, it makes users less secure. | ||
== | ==Types== | ||
* Adware: This type of spyware monitors user activity to then sell that data to malicious advertisers. | |||
* Info-stealer: This type of spyware takes data from the device, such as recent actions, applications, etc. | |||
* Key-loggers: Key-loggers are a type of Info-stealer that gains access to data by observing keystrokes done by a user on an infected machine(This data is then saved onto an encrypted log file). | |||
* Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level). <ref>{{Cite web |title=What Is Spyware? Definition, Types, And Protection |url=https://www.fortinet.com/resources/cyberglossary/spyware |url-status=live |access-date=19 Jan 2026 |website=Fortinet.com |type=Privacy focused article; designed to inform readers about the dangers of spyware and how to protect themselves.}}</ref> | |||
==References== | ==References== | ||