Spyware: Difference between revisions
m mixed and mashed a few words |
fixed sentence casing |
||
| Line 33: | Line 33: | ||
Spyware, as the name suggest, spies on the device, which contains the user's data. Spyware is inherently negative for users' privacy. As companies like [[Microsoft]], [[Meta]] and [[Google]] are collecting more information on consumers(either by legal or illegal means), they make users less secure & more susceptible to data breaches/leaks.<ref>{{Cite web |date=2 Jan 2026 |title=Data Breaches 2025: Biggest Cybersecurity Incidents So Far |url=https://www.pkware.com/blog/recent-data-breaches |access-date=31 Jan 2026 |website=pkware.com}}</ref> | Spyware, as the name suggest, spies on the device, which contains the user's data. Spyware is inherently negative for users' privacy. As companies like [[Microsoft]], [[Meta]] and [[Google]] are collecting more information on consumers(either by legal or illegal means), they make users less secure & more susceptible to data breaches/leaks.<ref>{{Cite web |date=2 Jan 2026 |title=Data Breaches 2025: Biggest Cybersecurity Incidents So Far |url=https://www.pkware.com/blog/recent-data-breaches |access-date=31 Jan 2026 |website=pkware.com}}</ref> | ||
===Spyware & | ===Spyware & data collection from a consumer rights perspective:=== | ||
====Lack of | ====Lack of transparency From companies:==== | ||
A lack of transparency on a consumers ability to opt-out of data collection if even possible is quite common among popular services | A lack of transparency on a consumers ability to opt-out of data collection if even possible is quite common among popular services | ||
| Line 51: | Line 50: | ||
*The option for consumers to properly see the data being collected allows them to more easily infer what data tends to be collected without dealing with intentionally deceptive language | *The option for consumers to properly see the data being collected allows them to more easily infer what data tends to be collected without dealing with intentionally deceptive language | ||
==Types( | ==Types(illegal/malware)<ref name=":1">{{Cite web |title=What Is Spyware? Definition, Types, And Protection |url=https://www.fortinet.com/resources/cyberglossary/spyware |access-date=19 Jan 2026 |website=Fortinet.com |type=Uses text to communicate information(with some additional imagery)}}</ref>== | ||
#Adware: This type of spyware monitors user activity to then sell that data to malicious advertisers. | #Adware: This type of spyware monitors user activity to then sell that data to malicious advertisers. | ||
| Line 58: | Line 57: | ||
#Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level). | #Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level). | ||
==Methods used by companies( | ==Methods used by companies (legal)<ref>{{Cite web |last=Davis |first=Lakisha |date=11 Apr 2025 |title=Data Harvesting 101: What Companies Know About You (And How They Use It) |url=https://metapress.com/data-harvesting-101-what-companies-know-about-you-and-how-they-use-it/ |access-date=20 Jan 2025 |website=metapress.com}}</ref>== | ||
#Cookies: Small pieces of data stored in files on your device(s). This type of data may include, but is not limited to: Preferences on websites, login information, & your browser history. | #Cookies: Small pieces of data stored in files on your device(s). This type of data may include, but is not limited to: Preferences on websites, login information, & your browser history. | ||