Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Spyware

Encyclopedia of Information Science and Technology, Fifth Edition
An unwanted software that has the ability of stealing the sensitive data, without your knowledge.
Published in Chapter:
Threats and Vulnerabilities of Mobile Applications
Thangavel M. (Thiagarajar College of Engineering, India), Divyaprabha M. (Thiagarajar College of Engineering, India), and Abinaya C. (Thiagarajar College of Engineering, India)
Copyright: © 2021 |Pages: 20
DOI: 10.4018/978-1-7998-3479-3.ch034
Abstract
Smart devices like mobile phones, tablets, and laptops have become necessities in our lives due to the services they provide. However, in recent days, mobile applications have become a major threat for an attack. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. Each day, a mobile device attack is changing dynamically, and it is very difficult to represent a complete set of threats and vulnerabilities. Mobile phone security has become an important aspect of security issues in wireless multimedia communications. The development of mobile applications has increased drastically; hence, it is our responsibility to protect our devices and the data within them. Being aware is the first step to protect data. Thus, to prevent the mobile from the threats, efforts are required to form the application developer, app market administrator, and user to defend against the malware. This article explores those threats and vulnerabilities of mobile applications.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing
Programs that are typically related to advertising and exchanging information from the client computer to a server, without the knowledge of it. They are a kind of non-destructive virus and are sometimes not detectable by antivirus applications, but rather by new applications called “Anti-spyware”.
Full Text Chapter Download: US $37.50 Add to Cart
Internet Crime: How Vulnerable Are You? Do Gender, Social Influence and Education play a Role in Vulnerability?
A software that gathers user information through the user’s Internet connection without his or her knowledge, usually for advertising purposes. Once installed, the spyware monitors user activities while on the Internet such as capture your keystrokes while typing the passwords, read and track your e-mail, record what sites you visit, record the credit card numbers; and transmits that information in the background to someone else.
Full Text Chapter Download: US $37.50 Add to Cart
Auditing Defense against XSS Worms in Online Social Network-Based Web Applications
In this type of attack, attacker collects all the user information without his knowledge by making him to install something which contains the malicious software.
Full Text Chapter Download: US $37.50 Add to Cart
Developments and Defenses of Malicious Code
This is a client-side software component that monitors the use of client activity and sends the collected data to a remote machine.
Full Text Chapter Download: US $37.50 Add to Cart
Online Social Networks Misuse, Cyber Crimes, and Counter Mechanisms
A software that installs itself on the computer and starts monitoring your online behavior without user permission is known as spyware.
Full Text Chapter Download: US $37.50 Add to Cart
ChatGPT and the Education System: Challenges and Risks in Teaching Learning Systems
Software or programs that are designed to secretly gather information from a user's computer or device without their knowledge or consent.
Full Text Chapter Download: US $37.50 Add to Cart
E-Commerce: The Benefits, Security Risks, and Countermeasures
In general, any software that gathers information about users or organizations without their knowledge.
Full Text Chapter Download: US $37.50 Add to Cart
Taxonomy of Cyber Threats to Application Security and Applicable Defenses
Usually unwanted and sometimes malicious software that is used to harvest Internet usage information from a user’s workstation.
Full Text Chapter Download: US $37.50 Add to Cart
Spyware
This is a particular form of software that gathers, without the users knowledge, information about the user and transmits it back manufacturer.
Published in Chapter: Spyware; From: Handbook of Research on Technoethics
Full Text Chapter Download: US $37.50 Add to Cart
Ransomware: A New Cyber Hijacking Threat to Enterprises
A client-side software component that monitors the use of client activity and sends the collected data to a remote machine.
Full Text Chapter Download: US $37.50 Add to Cart
BDS: Browser Dependent XSS Sanitizer
It is a program that normally move towards the computer and keeps track of the online activity of user. Spyware can also be installed automatically without the user’s consent while installing the other softwares.
Full Text Chapter Download: US $37.50 Add to Cart
E-Technology Challenges to Information Privacy
Software that installs itself on computers when programs are downloaded and that tracks each user click, usually without the user’s knowledge or permission.
Full Text Chapter Download: US $37.50 Add to Cart
Malicious Software
A type of malware that collects personal user information and transmits to a remote attacker.
Full Text Chapter Download: US $37.50 Add to Cart
Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms
It is a type of malicious software that attempt to capture the information related to any person or organization without their knowledge. It then sends this information to some other adversary who may use it for its own benefits.
Full Text Chapter Download: US $37.50 Add to Cart
The Ethics of Deception in Cyberspace
Software with a Trojan horse that secretly reports user activities over the Internet to a remote site.
Full Text Chapter Download: US $37.50 Add to Cart
Extending the Scope of eID Technology: Threats and Opportunities in a Commercial Setting
Malware that is installed on computers that collects little bits information at a time about users without their knowledge.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR