Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Everything You Need To Know About Spyware and Malware > NetSparsh - Viral Content you Love & Share

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay. The computer is really sluggish, and you are not running anything else. You click on a link, and BLAM you are redirected to a search page you've never heard of and the "back" button won't work.

You've got Spyware! Just what is "Spyware?" The word brings to mind exploding pens and shoe phones. In fact, software makers have struggled to define what spyware is, and is not.

The Anti-Spyware Coalition, a group of companies that include EarthLink, Microsoft, and Hewlett-Packard, have recently published a document that defines spyware as such: "Spyware impairs users control over material changes that affect their user experience, privacy or system security; use of their system resources, including what programs are installed on their computers; or collection, use and distribution of their personal or otherwise sensitive information"

In simpler terms, spyware "spies" the software on your computer, personal information, what web pages you look at, and in some cases, usernames and passwords. Ugh.

The first spyware distribution was in 1999, and is attributed to a popular freeware program called "Elf Bowling." Many users found to their dismay that this "harmless game," was sending information to the creators, Nsoft. This spawned the first anti-spyware program in the year 2000.

Now, both spyware and anti-spyware programs are too numerous to count.

There are several types of software that fall under the generic description of spyware. Let's look at a few, and what they do.

Adware ? adware is an application that displays advertising banners. The reason this is criticized is that it can send information back to the company, who then "targets" you with specific banners based on the web pages you've opened. This is different from clicking on a banner for more information. This program sneaks in the "back door," not "advertising" its presence. Please note that the word "AdWare" is a trademark of AdWare Systems, an honest software company. They are not a part of adware, just share the unfortunate name.

Key loggers are just that. They collect the keystrokes you make, like logging into your bank account, and send it to the hacker. Now he has your account number, user name, and password.

Hijackers and Toolbars are another form of spyware. Hijackers take over your browser, opening pages you don't want, and preventing you from opening ones you need ? like a site that tells you how to get rid of them. Toolbars are the same sort of thing. Now, you may want to have a toolbar like Yahoo or Google on your browser. They can make searches easier, and may have popup or ad blockers. The malware forms of these try to look like them, but they have completely different motives.

Malware is a generic term for "malicious" software. These programs don't just collect information; they are out to get your computer. Technically, these are not spyware, but a brief explanation seems to be in order. Malware spreads itself through the computer, changing files, making copies to send, even erasing the hard drive. Virus' and worms are a part of this group.

Other malware programs are "Trojan Horse, or Backdoor." These hide quietly in your computer until you connect to the internet. Then they creep around your browser, "reporting in" to the owner, who then uses your computer "address" to send out virus's, malware, and spam. Some hackers link several computers to send so much nonsense information to a particular web site that it is overwhelmed, causing it to shut down.

How does spyware end up on your computer? You're not going to like this . . . but most likely you loaded it on yourself! Wait! Before we get nasty letters, let us explain. Remember those "smileys" you downloaded last week? How about the cute cursor the nine year old picked? Most of these "free" programs have spyware attached, or imbedded in them. Even Adobe Reader loads a "Yahoo search bar" when you update the reader.

Remember when you installed the program and that gray box popped up with a thousand lines of small print? Did you read it? I doubt anyone does. The spyware distributor counts on that. If you do manage to slog through the legalese, and stuff only advanced programmers would know (or care about), there will be a few innocuous lines, something along the lines of: "this program will collect information to better your enjoyment of this program," or "a web search toolbar will be added to your browser." When you click on the "accept" button to install the software, you have also agreed to the spyware program.

Another way is when a box pops up claiming to be legitimate software needed to view the site properly, or that it is an update. It only has a "yes" button, implying that you are required to allow the download. These are copying legitimate updates from places like Microsoft, or Macromedia.

Just what is spyware going to do to your computer? Anything you can do, he can do better. It is an executable that can record keystrokes, read your files, watch your word processing program, change your home page, add and delete files, read your cookies (with personal info), then "phone home" with the info. Some spyware will crash your browser if you try to uninstall it. Others may "pretend" to be uninstalled, but they wait until your back is turned to load itself back on your system.

You don't know how the stuff was loaded on your computer, but it is causing all kinds of problems. The computer is running slower, certain programs are not working, and on occasion, you see the dreaded "blue screen of death." (crash). Don't worry, you are not alone According to an October 2004 study by America Online and the National Cyber-Security Alliance, 80% of surveyed users' computers had some form of spyware, with an average of 93 spyware components per computer. 89% of surveyed users with spyware reported that they did not know of its presence, and 95% reported that they had not given permission for it to be installed.

Now what do you do? There are several good "spyware removal" programs out there. But be warned! There are also a number of programs that claim to be anti-spyware that do not work, or worse add more spyware to your system! A good resource for "suspect" spyware is the list at: They have a list of over 200 programs that claim to take care of spyware, but may not do what they claim.

Once you get your computer "clean," how do you avoid getting "dirty" again? There are firewalls and programs designed to watch for known spyware. When you register, the "known spyware" definitions can be updated on a regular basis.

You could use a browser other than Internet Explorer (most spyware exploits problems here). This writer loves Mozilla Firefox ? it's free at

Our lawmakers are doing their best to stem the tide of spyware/malware. For example, in Washington State, USA, it is illegal for anyone other than the owner/operator of a computer to install software that alters web browser settings, monitors keystrokes, or disables computer security software.

The Gibson Research Corporation,, has several free fixes to "plug holes" in Internet Explorer's security.

There is hope. In 2005, NY Attorney General Eliot Spitzer brought suit against Intermix Media, Inc. Intermix's spyware program spread by drive-by download (loaded without permission), and installed itself in such a way it was very difficult to remove. Intermix settled for $7.5 million dollars.

Spyware is here to stay. Your best bet is to be informed ? know the tricks used by spyware to load itself. Use a firewall or spyware blocker program. Most important, understand exactly what that new program will install on your innocent computer.

Mike Christy is the owner of which is a free information site providing the latest Spyware news and instructions on how to remove Spyware from your computer.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at

Fox News

GOP leaders urge Homeland Security to adopt 'safe third country agreement' with Mexico over caravan
Fox News
Republican Sens. Chuck Grassley and Mike Lee are urging Department of Homeland Security head Kirstjen Nielsen to execute a "safe third country agreement" with the Mexican government, which would require members of the growing migrant caravan to ...
'Unacceptable Security Risk': Pompeo Says Central American Caravan 'Will Not Be Successful' in Breaching US BorderFox News Insider

all 3,517 news articles »

ABC News

Yahoo to pay $50M, other costs for massive security breach
ABC News
Yahoo has agreed to pay $50 million in damages and provide two years of free credit-monitoring services to 200 million people whose email addresses and other personal information were stolen as part of the biggest security breach in history. The ...
Yahoo must pay $50M in damages for security breachCNET

all 41 news articles »


Security guard shoots angry man during attack on Washington Fox affiliate, police say
Odemns was angry when he entered the lobby of the building housing the WTTG news offices, where the security guard shot him, the source told CNN. The suspect was not armed, Cmdr. Melvin Gresham of the Metropolitan Police Department said. The guard ...
Security guard shoots intruder at Fox station in Washington,
Security Guard Shot Man Who Broke into Fox 5 Station in Washington DCNBC4 Washington
Intruder Who Broke Into Fox TV Station In DC Shot By Security GuardDeadline
Washington Post -WTOP -FOX 5 DC -Twitter
all 408 news articles »


Elon Musk Mocks Bitcoin Security And Scams With Tongue-In-Cheek Tweet
Bitcoin is often mocked by the wider cryptocurrency sector for its older technology compared to some of its newer peers and now Elon Musk, a serial entrepreneur who's no stranger to controversy, has lampooned the bitcoin scams that plague Twitter and ...

and more »

Idaho Statesman

In an unusual step, Idaho GOP candidate brought a full security team to a debate
Idaho Statesman
It's also unknown if she regularly retains a large security presence. But her apparent heightened concern stands out in a state where few candidates pursue such protection. McGeachin is a businesswoman and former state lawmaker. Her debate with ...

National Security Adviser Bolton Says Arms Treaty With Russia Has Outlived Its Purpose
NPR's Ailsa Chang speaks with Melissa Hanham, weapons of mass destruction expert, about the timing and global impact of the U.S. pulling out of the nuclear non-proliferation treaty with Russia. Facebook; Twitter; Flipboard; Email ...

Armed private security will soon patrol some Tempe parks as 'people are fed up'
Armed security guards will soon patrol some Tempe parks. The Tempe City Council on Monday unanimously approved spending $250,000 to hire G4S, a global security services company. The idea is to ease residents' concerns about safety and trash in ...

Baltimore Sun

Johns Hopkins seeks community input on renewed effort to increase security, create possible police force
Baltimore Sun
The Johns Hopkins University is renewing efforts to bolster security measures β€” including the possible addition of a police force β€” with a series of forums and community conversations through the end of the year. The push comes months after the ...

and more »


National security adviser John Bolton rebuffs Russian appeals to remain in key nuclear-arms pact
Washington Post
MOSCOW β€” National security adviser John Bolton held firm Tuesday to President Trump's announcement that the United States would withdraw from a landmark arms control treaty in place since the Soviet era. Bolton said the United States would present β€œin ...
US National Security Advisor Bolton reacts to Putin meetingeuronews
Putin to meet with US national security advisor on October 23TASS
US national security adviser says Russian meddling has created 'mistrust'
Yahoo News
all 2,291 news articles »

Statesman Journal

Salem security guard gets life in prison for murdering 25-year-old at Denny's
Statesman Journal
A former security guard was sentenced to life in prison Monday for shooting and killing a man while on duty outside a Salem Denny's restaurant in 2017. After less than 10 minutes of deliberation, a Marion County jury unanimously convicted Gregory ...

and more »
Google News

Free Ways to Tackle Threats to Your Computer

Protect Your PCHaving problems with your pc? Do your kids,... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

How To Clean the Spies In Your Computer?

Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

Phishing: A Scary Way of Life

The Federal Bureau of Investigation has identified "phishing" as the... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

Viruses and Worms: The Problems and Their Solutions

History and BackgroundThe virus was one of the first ever... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

SCAMS ? Be Aware ? And Report When Necessary

The Internet is a vast International Network of people and... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

Do You Know What your Kids Are Doing Online?

It's a sad statistic, but hundreds of unsuspecting kids are... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture... Read More

Its War I Tell You!

There are ways to insure security though. You can get... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More