From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Spyware overview

Spyware overview

From the course: Ethical Hacking: System Hacking

Start my 1-month free trial

Spyware overview

- [Voiceover] Malware can be grouped in five different categories, spyware, viruses, worms, trojans and rootkits. Spyware is a form of malware that is placed onto a system by a number of different methods, and is used by organized crime, hackers, advertisers, and even countries. Once a system is infected with spyware, data is harvested by various methods. Spyware can monitor screen activity, capture keystrokes, gather web form data, track your internet usage, and also, allow an attacker to gain unauthorized access to sensitive data, and then the spyware phones home with the information. Once the data is collected, it is many times sold to others for use in identity theft, spam, and other predatory activities. Spyware is designed to monitor your movement on the internet, such as places you have visited, and some cases can hijack your connection, and redirect you to other websites. When spyware or anytime of malware has infected your system it can cause your system to act in an…

Contents