H0l0 (talk | contribs)
m mixed and mashed a few words
fixed sentence casing
Line 33: Line 33:
Spyware, as the name suggest, spies on the device, which contains the user's data. Spyware is inherently negative for users' privacy. As companies like [[Microsoft]], [[Meta]] and [[Google]] are collecting more information on consumers(either by legal or illegal means), they make users less secure & more susceptible to data breaches/leaks.<ref>{{Cite web |date=2 Jan 2026 |title=Data Breaches 2025: Biggest Cybersecurity Incidents So Far |url=https://www.pkware.com/blog/recent-data-breaches |access-date=31 Jan 2026 |website=pkware.com}}</ref>
Spyware, as the name suggest, spies on the device, which contains the user's data. Spyware is inherently negative for users' privacy. As companies like [[Microsoft]], [[Meta]] and [[Google]] are collecting more information on consumers(either by legal or illegal means), they make users less secure & more susceptible to data breaches/leaks.<ref>{{Cite web |date=2 Jan 2026 |title=Data Breaches 2025: Biggest Cybersecurity Incidents So Far |url=https://www.pkware.com/blog/recent-data-breaches |access-date=31 Jan 2026 |website=pkware.com}}</ref>


===Spyware & Data Collection from a Consumer Rights Perspective:===
===Spyware & data collection from a consumer rights perspective:===
----


====Lack of Transparency From Companies:====
====Lack of transparency From companies:====
A lack of transparency on a consumers ability to opt-out of data collection if even possible is quite common among popular services
A lack of transparency on a consumers ability to opt-out of data collection if even possible is quite common among popular services


Line 51: Line 50:
*The option for consumers to properly see the data being collected allows them to more easily infer what data tends to be collected without dealing with intentionally deceptive language
*The option for consumers to properly see the data being collected allows them to more easily infer what data tends to be collected without dealing with intentionally deceptive language


==Types(Illegal/Malware)<ref name=":1">{{Cite web |title=What Is Spyware? Definition, Types, And Protection |url=https://www.fortinet.com/resources/cyberglossary/spyware |access-date=19 Jan 2026 |website=Fortinet.com |type=Uses text to communicate information(with some additional imagery)}}</ref>==
==Types(illegal/malware)<ref name=":1">{{Cite web |title=What Is Spyware? Definition, Types, And Protection |url=https://www.fortinet.com/resources/cyberglossary/spyware |access-date=19 Jan 2026 |website=Fortinet.com |type=Uses text to communicate information(with some additional imagery)}}</ref>==


#Adware: This type of spyware monitors user activity to then sell that data to malicious advertisers.
#Adware: This type of spyware monitors user activity to then sell that data to malicious advertisers.
Line 58: Line 57:
#Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level).
#Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level).


==Methods used by companies(Legal)<ref>{{Cite web |last=Davis |first=Lakisha |date=11 Apr 2025 |title=Data Harvesting 101: What Companies Know About You (And How They Use It) |url=https://metapress.com/data-harvesting-101-what-companies-know-about-you-and-how-they-use-it/ |access-date=20 Jan 2025 |website=metapress.com}}</ref>==
==Methods used by companies (legal)<ref>{{Cite web |last=Davis |first=Lakisha |date=11 Apr 2025 |title=Data Harvesting 101: What Companies Know About You (And How They Use It) |url=https://metapress.com/data-harvesting-101-what-companies-know-about-you-and-how-they-use-it/ |access-date=20 Jan 2025 |website=metapress.com}}</ref>==


#Cookies: Small pieces of data stored in files on your device(s). This type of data may include, but is not limited to: Preferences on websites, login information, & your browser history.
#Cookies: Small pieces of data stored in files on your device(s). This type of data may include, but is not limited to: Preferences on websites, login information, & your browser history.