From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Spyware types

Spyware types

From the course: Ethical Hacking: System Hacking

Start my 1-month free trial

Spyware types

- Spyware comes in many different categories. All can pose a serious problem, as they are designed to track your usage and capture passwords and data. Ad Networks are companies that pay software developers to display ads when viewing the site. First, the user is enticed to visit the site. Once in the site, there may be some ploy, such as a pop-up, to entice you to download a cookie. However, most of the time the software is installed without a user's knowledge or consent. The user's browsing habits are tracked so that ads can be specifically designed for them. Also, movement can be tracked as well, meaning each time you go to open an ad, or go to a site that is a particular network, this is tracked as well. A Trojan Horse, many times, is presented as a useful tool or utility through a free download. A Trojan Horse also could be bundled into a popular program and is offered as a bonus add-on in addition to the main software. It's really important to read the end-user license agreement…

Contents