Spyware is a type of malware that is installed on computers without the user's consent .
Spyware goes about collecting small amounts of information at a time about you . What information spyware collects may be relatively harmless and have little or no impact on you or it may lethal and inflict life-altering consequences on you !
Before the Microsoft's Internet Explorer 7 was released , the browser would automatically show an install window for any ActiveX component that a website wanted to install . The combination of user ignorance towards malicious software and the assumption by Internet Explorer that ActiveX components are harmless , helped in the massive spread of spyware . Spyware software also takes advantage of weaknesses in Javascript , Internet Explorer , and Windows to install itself on your computer without your knowledge or permission .
Unlike viruses and worms , spyware does not usually self-replicate . Like typical viruses , spyware exploits infected computers for commercial gain . Typical tactics include delivery of unsolicited pop-up advertisements , theft of personal information such as credit card and social security numbers , monitoring of
Spyware goes about collecting small amounts of information at a time about you . What information spyware collects may be relatively harmless and have little or no impact on you or it may lethal and inflict life-altering consequences on you !
Before the Microsoft's Internet Explorer 7 was released , the browser would automatically show an install window for any ActiveX component that a website wanted to install . The combination of user ignorance towards malicious software and the assumption by Internet Explorer that ActiveX components are harmless , helped in the massive spread of spyware . Spyware software also takes advantage of weaknesses in Javascript , Internet Explorer , and Windows to install itself on your computer without your knowledge or permission .
Unlike viruses and worms , spyware does not usually self-replicate . Like typical viruses , spyware exploits infected computers for commercial gain . Typical tactics include delivery of unsolicited pop-up advertisements , theft of personal information such as credit card and social security numbers , monitoring of