Spyware: Difference between revisions
Added the "Types" section and added a 2nd citation. (I may work on this article more in the future btw) |
I've added quite a bit, don't feel like summarizing it all :/ |
||
| Line 3: | Line 3: | ||
Spyware is a form of malware designed to gather information from the infected device. Spyware comes in many different shapes and forms and may be installed intentionally or unintentionally. | Spyware is a form of malware designed to gather information from the infected device. Spyware comes in many different shapes and forms and may be installed intentionally or unintentionally. | ||
In some circles, some may qualify non-malware software as spyware, such as [[Microsoft]], [[Meta]], and [[Google]]<ref>{{Cite web |title=The Data Big Tech Companies Have On You |url=https://www.security.org/resources/data-tech-companies-have/ |access-date=21 August 2025}}</ref> owned software due to the large quantity of data these corporations collect from its users, though others disagree with that qualification, due to the user having technically consented to this espionage. | In some circles, some may qualify non-malware software as spyware, such as [[Microsoft]], [[Meta]], and [[Google]]<ref name=":0">{{Cite web |last=Petrino |first=Gene |title=The Data Big Tech Companies Have On You |url=https://www.security.org/resources/data-tech-companies-have/ |url-status=live |access-date=21 August 2025 |website=security.org |type=Uses text to communicate information(with some additional imagery)}}</ref> owned software due to the large quantity of data these corporations collect from its users, though others disagree with that qualification, due to the user having technically consented to this espionage. | ||
==How it works== | ==How it works== | ||
Spyware comes in many different forms. It may present itself as an actual software, while secretly spying on your device in the background. | Spyware comes in many different forms. It may present itself as an actual software, while secretly spying on your device in the background. | ||
Malware with deeper level access to your device has more potential for harm, which is a reason some are cautious of [[Kernel level driver|Kernel Level Drivers]]. | Malware with deeper level access to your device has more potential for harm, which is a reason some are cautious of [[Kernel level driver|Kernel Level Drivers]]. | ||
Some "free" services, such as [[Google]] services(check here for more info: [[List of Google products]]), often come at the cost of user data being collected to be sold for profit and/or to be used as training data for [[Artificial intelligence]]. | |||
The Legally collected data may also just be diagnostic data or just a way to make things "more convenient"(like with cookies). | |||
=== Data that tends to get collected:<ref name=":0" /> === | |||
* Username | |||
* Password | |||
* Email addresses | |||
* Diagnostic data(how you use their platform, errors & crash reports, logs, etc) | |||
* Phone Number | |||
* Payment Information | |||
* Stored videos & photos | |||
* Metadata of photos & files | |||
* Stored documents | |||
* Contact info from other devices. | |||
* Internet-protocol(IP) addresses | |||
* Browser Type | |||
* Device Type | |||
==Why it is a problem== | ==Why it is a problem== | ||
Spyware, as the name suggest, spies on the device, which contains the user's data. Spyware is inherently negative for users' privacy. As companies like [[Microsoft]], [[Meta]] and [[Google]] are | Spyware, as the name suggest, spies on the device, which contains the user's data. Spyware is inherently negative for users' privacy. As companies like [[Microsoft]], [[Meta]] and [[Google]] are collecting more information on consumers(either by legal or illegal means), they make users less secure & more susceptible to data breaches/leaks. | ||
==Types(Illegal/Malware)<ref>{{Cite web |title=What Is Spyware? Definition, Types, And Protection |url=https://www.fortinet.com/resources/cyberglossary/spyware |url-status=live |access-date=19 Jan 2026 |website=Fortinet.com |type=Uses text to communicate information(with some additional imagery)}}</ref>== | |||
#Adware: This type of spyware monitors user activity to then sell that data to malicious advertisers. | |||
#Info-stealer: This type of spyware takes data from the device, such as recent actions, applications, etc. | |||
#Key-loggers: Key-loggers are a type of Info-stealer that gains access to data by observing keystrokes done by a user on an infected machine(This data is then saved onto an encrypted log file). | |||
#Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level). | |||
== Methods used by companies(Legal)<ref>{{Cite web |last=Davis |first=Lakisha |date=11 Apr 2025 |title=Data Harvesting 101: What Companies Know About You (And How They Use It) |url=https://metapress.com/data-harvesting-101-what-companies-know-about-you-and-how-they-use-it/ |access-date=20 Jan 2025 |website=metapress.com}}</ref> == | |||
# Cookies: Small pieces of data stored in files on your device(s). This type of data may include, but is not limited to: Preferences on websites, login information, & your browser history. | |||
# Tracking Pixels: Tracking pixels are incredibly small images that are embedded into websites or emails. This method allows companies to see how users interact with their content on the web. | |||
# Accounts & Online Forms: Websites typically have users sign up with an account so they can tie data to it. Both account setup and forms similar to it tend to require data such as: Email addresses, phone numbers, Names, & sometimes data that should be optional(like your location). | |||
# Device & location tracking: Some websites will request access to your geographical position(which can be declined), but what tends to be collected more often are IP addresses(tends to be outside of your control). | |||
== | == See also == | ||
* | * [[Anti-privacy legislation]](Extremely undeveloped article, but still on the topic of privacy) | ||
* [[Data brokers]] | |||
* | * [[Device fingerprint]] | ||
* | |||
==References== | ==References== | ||