Many types of spyware can be divided into subclassifications. For example, keyloggers are a form of spyware that record keyboard input, while banking trojans or banker trojans are a form of spyware that steal bank account information. These categories aren't mutually-exclusive; many types of spyware will include multiple functions from several sub-categories (such as recording keyboard data and also launching browser hijack attacks).
All forms of spyware are dangerous to the information that's stored on your computer and should be considered extreme violations of your privacy. Our malware research team particularly recommends the usage of potent anti-malware products to detect or remove spyware infections due to the array of advanced obfuscation and stealth techniques that many types of spyware use.
Common Symptoms of Spyware Attacks
Perhaps more than any other PC threat besides rootkits, spyware programs are built to avoid detection – since they can scarcely steal your information if you know that they're on your PC! Accordingly, symptoms of spyware attacks are likely to be extremely minor and, upon occasion, not in evidence at all. However, some types of spyware will show small traces of indirect evidence during their attacks.
Some types of spyware redirect victims from normal websites towards phishing copycat sites as a preferred method of informational theft. While phishing sites that are promoted by banking trojans and similar types of spyware are often designed to look as close as possible to the original site, our malware experts note that watching for minor changes in the web address or URL can help you spot phishing sites. You should also be wary of login portals that display themselves in unusual ways – for example, if a site asks you to log in to your account under circumstances that ordinarily wouldn't require you to do so.
Many types of spyware are also active in memory, either as independent memory processes or (more frequently) as code that's injected into normal system processes. If you're aware of how much memory a process normally uses and can notice sharp discrepancies in RAM or CPU expenditures, you may be able to detect a spyware code-injection attack. Primitive types of spyware may also degrade your computer's performance with their constant reconnaissance activities.
The Consequences of a Spyware Infection
Like most types of malicious software or malware, spyware is often designed to make money for the criminals that distribute it. Inadequate protection from spyware attacks can result in theft of bank account assets, loss of control over website/application accounts or even a loss of in-game items and currency (as in the case of the mmorpg genre's infamous gold-farming industry). Even purely visual or audio data aren't guaranteed to be safe from spyware, since spyware often includes such functions as taking screen captures or spying on webcams and microphones.
Our malware researchers suggest that you immediately take measures to disinfect your PC if you suspect that you've acquired a spyware infection. If at all possible, you should also try to identify the information that the spyware has targeted and take appropriate security precautions. For example, changing passwords for an account that's been targeted by spyware attacks can prevent criminals from hijacking your account with the already-stolen data (regardless of what happens to the spyware program from that point onward).
Is Your PC Infected with Spyware?
To safely & quickly detect Spyware, we highly recommend you click below to run SpyHunter's up-to-date malware scanner.
Download SpyHunter’s* Spyware Scanner What happens if Spyware does not let you open SpyHunter or blocks the Internet?
There are currently 471 spyware parasites listed in our database.
|4Arcade||06/22/2008 13:15:21 EST|
|4Arcade PBar||03/28/2006 11:19:23 EST|
|AboutBlankUninstaller||02/09/2011 09:19:45 EST|
|Accoona||07/24/2009 20:00:47 EST|
|AceSpy||03/28/2006 11:19:23 EST|
|Acext||03/28/2006 11:19:23 EST|
|Active Key Logger||03/28/2006 11:19:23 EST|
|ActiveX_blocklist||07/24/2009 20:01:43 EST|
|AdClicker||07/24/2009 20:00:48 EST|
|Adssite||01/15/2008 10:40:31 EST|
|Adssite ToolBar||06/18/2008 13:37:13 EST|
|AdvancedPrivacyGuard||09/05/2008 17:59:52 EST|
|Adware Patrol||06/04/2008 15:54:05 EST|
|Adware Spyware Be Gone||02/15/2007 07:28:10 EST|
|Adware.ActivShop||06/08/2008 16:22:21 EST|
|Adware.BHO.BluSwede||04/30/2008 11:41:03 EST|
|Adware.BHO.je||06/09/2007 12:32:43 EST|
|Adware.BitLocker||07/24/2009 20:00:47 EST|
|Adware.Extratoolbar||02/13/2007 14:30:20 EST|
|Adware.HotSearchBar||07/24/2009 20:00:47 EST|
|Adware.Insider||07/24/2009 20:00:48 EST|
|Adware.RelatedLinks||06/11/2008 14:06:54 EST|
|Adware.Rotator||05/12/2011 12:30:44 EST|
|Adware.TSAdbot||07/20/2010 05:54:09 EST|
|AdwareFinder||07/24/2009 20:00:47 EST|
Page(s): 1 2 3 4 5 6 7 8 9 10
Search by Letter:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z