“Malware” is a very general word for software that deliberately harms, restricts, alters, or stops your computer from working properly, and you do not give your permission for installation and use.

All infectors (worms, viruses, Trojans) are malware. Sometimes when someone downloads a “free” program from the internet, whether the program is for access to a restricted website, to play a game, or to use a peer-to-peer file sharing program, there can be compensation for the privilege of downloading the free software. This compensation can be in the form of a phone bill from a long distance internet access connection or giving your permission by marking the box that says you already read the ‘Terms of the Agreement’ or the ‘License Agreement’ before downloading. These agreements can say you are giving your permission to the company or website to track or monitor your online activities and behavior for marketing or statistical purposes; or, you are giving your permission for this company or website to use the resources of your computer.

You can recognize the possibility of adware, spyware, or malware already installed on your computer by:

the computer light blinking (meaning that your computer is processing information) at unusual or unexpected times. This is difficult to observe with broadband since there is not a visual difference between incoming and outgoing data

when the amount of pop-up advertisements is way too much or immediately begins when you connect to the internet your browser settings keep changing, including the webpage you designate as your start-up page

files are uploaded or downloaded without your prompting

Adware is software that displays advertising while it is being used. The computer user has an option to buy a license to stop the advertisements from displaying. This adware is not malware or infectious because the computer user knows that in exchange for not buying a license, they will see advertisements that the company hopes they will click on and buy the product or service. Other adware License Agreements include permissions from the user to the company for privileges stated in the agreement. The computer user should always read and understand any agreement before accepting. If you do not read and understand what you are agreeing to, you may be giving your permission, for example, to the company or third party to monitor your activities while online. This monitoring can be where you go, where you shop, or your web browsing preferences and habits. Companies find this information useful so they can generate advertisements customized specifically for your interests, likes, and dislikes. Adware is generating much discussion about balancing the rights and privacy of consumers and customers. So, be sure you read and understand all agreements before accepting them.

Spyware is tracking software that hides itself (runs in the background) and gathers information without the computer owner’s or user’s knowledge or permission for the benefit of someone else. It uses the computer owner’s internet connection to send the collected information to whomever the tracking software designates. This is the reason for the invalid default internet connection discussed in the “Home Computer Security” chapter. Spyware can compromise the safety of your passwords, logon information, financial, or personal information. Collected information can include your online habits and preferences (where you go, where you shop, for what, how much, how often, etc), each key you press on your keyboard, passwords, logon information, account and financial information,
online correspondence and conversations.

What spyware and malware have in common is the ability to collect and distribute your personal information. Malware can also send and make computer resources and information available to unknown recipients or remote users without your knowledge or permission.

Both spyware and malware are possible methods for identity theft since the computer owner or user does not know about or does not provide their permission for the installation
and use of the hidden program or file.

There are legitimate uses for spyware (monitoring software) by law enforcement, parents, and employers. If you have a court order to monitor the activities of someone; or, are legally responsible for the actions and safety of someone such as a child or employee; then, you usually have the option to monitor the online activities of that person if you own the computer or computer system where the monitoring software is installed.

Use anti-virus and spyware detection software. Be aware of how and when your computer reacts differently than its’ usual behavior. If you have any suspicions of criminal activity directed specifically towards your home computer, contact the Internet Crime Complaint Center or your local cybercrime task force.”

Spyware Related Websites

FTC Blog

Anti-Spyware Coalition

PC Stats

Spyware Guide

Spyware Void

Stop Badware



Play the “Beware of Spyware” Game by the FTC

Spyware Articles

A Primer in Malware: Viruses, Spyware and Bots, Oh My!

Electronic Gifts Could Track His Moves

Researchers Find More Versions of Digitally Signed Mac OS X Spyware

Boffin’s Top Choice for Anti-Spyware This Year

New Mac Spyware Found on Angolan Activists’ Computer

Media companies want Congress to leagalize spyware, malware and other insane acts

Spyware from West used to target activists

How spyware works?

Mozilla warns European spyware maker to stop spoofing us

Spyware used by governments poses as Firefox and Mozilla is angry

Judge denies FBI request to hijack suspect’s personal computer using spyware

‘Redpill’ spyware used for seizing information from Indian internet users

Court partially dismisses Google mobile app spyware case

How to spring-clean and revive your personal computer

Take the Spyware Quiz

Cisco Meraki MX60 Cloud Managed Security Appliance picture
Cisco Meraki MX60 Cloud Managed Security Appliance

Sonicwall TZ-350 Sec Upg Plus 3yr (02ssc1844) picture
Sonicwall TZ-350 Sec Upg Plus 3yr (02ssc1844)

Good Cisco Meraki MX67-HW Router Security Appliance - SH0526 picture
Good Cisco Meraki MX67-HW Router Security Appliance - SH0526

Meraki MX67W-HW Wireless Cloud Managed Meraki Firewall  picture
Meraki MX67W-HW Wireless Cloud Managed Meraki Firewall 

Watchguard Firebox T35 With 2 Year Standard Support picture
Watchguard Firebox T35 With 2 Year Standard Support

CISCO ASA5545-K9 ASA 5545-X Adaptive Security Appliance Dual PSU (2X) 128GB SSD picture
CISCO ASA5545-K9 ASA 5545-X Adaptive Security Appliance Dual PSU (2X) 128GB SSD

NETGEAR N300 Wireless WiFi Router - WNR2000-110NAS Parental Controls picture
NETGEAR N300 Wireless WiFi Router - WNR2000-110NAS Parental Controls