“Malware” is a very general word for software that deliberately harms, restricts, alters, or stops your computer from working properly, and you do not give your permission for installation and use.

All infectors (worms, viruses, Trojans) are malware. Sometimes when someone downloads a “free” program from the internet, whether the program is for access to a restricted website, to play a game, or to use a peer-to-peer file sharing program, there can be compensation for the privilege of downloading the free software. This compensation can be in the form of a phone bill from a long distance internet access connection or giving your permission by marking the box that says you already read the ‘Terms of the Agreement’ or the ‘License Agreement’ before downloading. These agreements can say you are giving your permission to the company or website to track or monitor your online activities and behavior for marketing or statistical purposes; or, you are giving your permission for this company or website to use the resources of your computer.

You can recognize the possibility of adware, spyware, or malware already installed on your computer by:

the computer light blinking (meaning that your computer is processing information) at unusual or unexpected times. This is difficult to observe with broadband since there is not a visual difference between incoming and outgoing data

when the amount of pop-up advertisements is way too much or immediately begins when you connect to the internet your browser settings keep changing, including the webpage you designate as your start-up page

files are uploaded or downloaded without your prompting

Adware is software that displays advertising while it is being used. The computer user has an option to buy a license to stop the advertisements from displaying. This adware is not malware or infectious because the computer user knows that in exchange for not buying a license, they will see advertisements that the company hopes they will click on and buy the product or service. Other adware License Agreements include permissions from the user to the company for privileges stated in the agreement. The computer user should always read and understand any agreement before accepting. If you do not read and understand what you are agreeing to, you may be giving your permission, for example, to the company or third party to monitor your activities while online. This monitoring can be where you go, where you shop, or your web browsing preferences and habits. Companies find this information useful so they can generate advertisements customized specifically for your interests, likes, and dislikes. Adware is generating much discussion about balancing the rights and privacy of consumers and customers. So, be sure you read and understand all agreements before accepting them.

Spyware is tracking software that hides itself (runs in the background) and gathers information without the computer owner’s or user’s knowledge or permission for the benefit of someone else. It uses the computer owner’s internet connection to send the collected information to whomever the tracking software designates. This is the reason for the invalid default internet connection discussed in the “Home Computer Security” chapter. Spyware can compromise the safety of your passwords, logon information, financial, or personal information. Collected information can include your online habits and preferences (where you go, where you shop, for what, how much, how often, etc), each key you press on your keyboard, passwords, logon information, account and financial information,
online correspondence and conversations.

What spyware and malware have in common is the ability to collect and distribute your personal information. Malware can also send and make computer resources and information available to unknown recipients or remote users without your knowledge or permission.

Both spyware and malware are possible methods for identity theft since the computer owner or user does not know about or does not provide their permission for the installation
and use of the hidden program or file.

There are legitimate uses for spyware (monitoring software) by law enforcement, parents, and employers. If you have a court order to monitor the activities of someone; or, are legally responsible for the actions and safety of someone such as a child or employee; then, you usually have the option to monitor the online activities of that person if you own the computer or computer system where the monitoring software is installed.

Use anti-virus and spyware detection software. Be aware of how and when your computer reacts differently than its’ usual behavior. If you have any suspicions of criminal activity directed specifically towards your home computer, contact the Internet Crime Complaint Center or your local cybercrime task force.”

Spyware Related Websites

FTC Blog

Anti-Spyware Coalition

PC Stats

Spyware Guide

Spyware Void

Stop Badware

SUPERAntispyware

Wikipedia

Play the “Beware of Spyware” Game by the FTC

Spyware Articles

A Primer in Malware: Viruses, Spyware and Bots, Oh My!

Electronic Gifts Could Track His Moves

Researchers Find More Versions of Digitally Signed Mac OS X Spyware

Boffin’s Top Choice for Anti-Spyware This Year

New Mac Spyware Found on Angolan Activists’ Computer

Media companies want Congress to leagalize spyware, malware and other insane acts

Spyware from West used to target activists

How spyware works?

Mozilla warns European spyware maker to stop spoofing us

Spyware used by governments poses as Firefox and Mozilla is angry

Judge denies FBI request to hijack suspect’s personal computer using spyware

‘Redpill’ spyware used for seizing information from Indian internet users

Court partially dismisses Google mobile app spyware case

How to spring-clean and revive your personal computer

Take the Spyware Quiz


NEW Factory Sealed AVAYA J100/K100 Wireless Module - 700512402 picture

NEW Factory Sealed AVAYA J100/K100 Wireless Module - 700512402

$40.00



Avaya JEM24 Expansion Module (700514337) - Brand New w/1-Year Warranty picture

Avaya JEM24 Expansion Module (700514337) - Brand New w/1-Year Warranty

$109.95



Avaya J169 IP Phone (700513634) Brand New, 1 Year Warranty picture

Avaya J169 IP Phone (700513634) Brand New, 1 Year Warranty

$82.95



Avaya J179 Gigabit IP Phone (700513569) - Brand New w/1-Year Warranty picture

Avaya J179 Gigabit IP Phone (700513569) - Brand New w/1-Year Warranty

$149.95



Avaya ACP DELL 16GB MEMORY MODULE FRU (700514188) In Box picture

Avaya ACP DELL 16GB MEMORY MODULE FRU (700514188) In Box

$299.99



Avaya 9641GS IP Phone, HD Voice, Bluetooth & 5

Avaya 9641GS IP Phone, HD Voice, Bluetooth & 5" Touchscreen 700505992, Lot of 28

$560.00



Avaya J179 Self-Labeling 24-Key Color Ethernet Gigabit VoIP Telephone 700513630 picture

Avaya J179 Self-Labeling 24-Key Color Ethernet Gigabit VoIP Telephone 700513630

$87.77



Avaya J159 IP Phone (700512394) - New Open Box, 1 Year Warranty picture

Avaya J159 IP Phone (700512394) - New Open Box, 1 Year Warranty

$124.95



AVAYA - DS1404065-E5 - Ethernet Routing Switch 8692SF Fabric/CPU Module picture

AVAYA - DS1404065-E5 - Ethernet Routing Switch 8692SF Fabric/CPU Module

$55.00



AVAYA 5520-48T-PWR  Ethernet Routing Switch. picture

AVAYA 5520-48T-PWR Ethernet Routing Switch.

$125.00