Spyware

Spyware is a classification of malicious software that’s based on the ultimate consequence of their attacks: theft of information from your PC, especially private or potentially profitable data. Spyware is often designed to steal passwords and other login-related information that allows criminals to hijack accounts for banks or even gaming applications. Although the methodology of a spyware attack can vary significantly, most types of spyware will use sophisticated strategies to avoid giving themselves away to the PC user.

Many types of spyware can be divided into subclassifications. For example, keyloggers are a form of spyware that record keyboard input, while banking trojans or banker trojans are a form of spyware that steal bank account information. These categories aren’t mutually-exclusive; many types of spyware will include multiple functions from several sub-categories (such as recording keyboard data and also launching browser hijack attacks).

All forms of spyware are dangerous to the information that’s stored on your computer and should be considered extreme violations of your privacy. Our malware research team particularly recommends the usage of potent anti-malware products to detect or remove spyware infections due to the array of advanced obfuscation and stealth techniques that many types of spyware use.

Common Symptoms of Spyware Attacks

Perhaps more than any other PC threat besides rootkits, spyware programs are built to avoid detection – since they can scarcely steal your information if you know that they’re on your PC! Accordingly, symptoms of spyware attacks are likely to be extremely minor and, upon occasion, not in evidence at all. However, some types of spyware will show small traces of indirect evidence during their attacks.

Some types of spyware redirect victims from normal websites towards phishing copycat sites as a preferred method of informational theft. While phishing sites that are promoted by banking trojans and similar types of spyware are often designed to look as close as possible to the original site, our malware experts note that watching for minor changes in the web address or URL can help you spot phishing sites. You should also be wary of login portals that display themselves in unusual ways – for example, if a site asks you to log in to your account under circumstances that ordinarily wouldn’t require you to do so.

Many types of spyware are also active in memory, either as independent memory processes or (more frequently) as code that’s injected into normal system processes. If you’re aware of how much memory a process normally uses and can notice sharp discrepancies in RAM or CPU expenditures, you may be able to detect a spyware code-injection attack. Primitive types of spyware may also degrade your computer’s performance with their constant reconnaissance activities.

The Consequences of a Spyware Infection

Like most types of malicious software or malware, spyware is often designed to make money for the criminals that distribute it. Inadequate protection from spyware attacks can result in theft of bank account assets, loss of control over website/application accounts or even a loss of in-game items and currency (as in the case of the mmorpg genre’s infamous gold-farming industry). Even purely visual or audio data aren’t guaranteed to be safe from spyware, since spyware often includes such functions as taking screen captures or spying on webcams and microphones.

Our malware researchers suggest that you immediately take measures to disinfect your PC if you suspect that you’ve acquired a spyware infection. If at all possible, you should also try to identify the information that the spyware has targeted and take appropriate security precautions. For example, changing passwords for an account that’s been targeted by spyware attacks can prevent criminals from hijacking your account with the already-stolen data (regardless of what happens to the spyware program from that point onward).

Is Your PC Infected with Spyware?

To safely & quickly detect Spyware, we highly recommend you click below to run SpyHunter's up-to-date malware scanner.

Download SpyHunter's* Spyware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria.

There are currently 476 spyware program(s) in our database.

Name Date
4Arcade June 22, 2008
4Arcade PBar March 28, 2006
AboutBlankUninstaller February 9, 2011
Accoona July 24, 2009
AceSpy March 28, 2006
Acext March 28, 2006
ActionSpy June 12, 2020
Active Key Logger March 28, 2006
ActiveX_blocklist July 24, 2009
AdClicker July 24, 2009
Adssite January 15, 2008
Adssite ToolBar June 18, 2008
AdvancedPrivacyGuard September 5, 2008
Adware Patrol June 4, 2008
Adware Spyware Be Gone February 15, 2007
Adware.ActivShop June 8, 2008
Adware.BHO.BluSwede April 30, 2008
Adware.BHO.je June 9, 2007
Adware.BitLocker July 24, 2009
Adware.Extratoolbar February 13, 2007
Adware.HotSearchBar July 24, 2009
Adware.Insider July 24, 2009
Adware.RelatedLinks June 11, 2008
Adware.Rotator May 12, 2011
Adware.TSAdbot July 20, 2010
1 2 3 4 5 6 7 8 9 10 11 20

Search by Letter:
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  0  1  2  3  4  5  6  7  8  9  

Home Malware Programs Spyware