What Is Spyware?
Uncovering the darker side of the ‘net…
Spyware is arguably one of the internet’s lesser-known threats. While most people are aware of viruses, and many of us understand how worms operate, spyware has generally received less attention. That’s partly because it poses less immediate risk than a virus, and it doesn’t self-replicate like a worm. However, it can still be extremely damaging so it’s vital to take precautions against this malicious software (also known as malware).
In essence, spyware is any program or piece of code that hides on a host’s computer system. It is designed to be undetectable, often burying itself within program files or registry keys where only an IT expert would be able to spot its presence. Once embedded deep within a device’s hard drive, the malware can set to work in one of the following guises:
- System monitoring. This is a particularly dangerous form of spyware since it silently and invisibly tracks the activities of each person using the infected machine. As well as viewing webcams or watching screen activity, it may take the form of keystroke logging. By methodically recording every press of a key, it’s possible to see which characters and symbols were used to log into online banking or provide passwords for social media accounts.
- Cookies. Cookies are tiny files that remember your internet history. Most are innocent enough, so don’t be alarmed by a trusted website asking you to accept them. However, tracking cookies record your online activities conducted through your unique IP address, before sending these data files on to unknown recipients. It’s unlikely you’ll ever be invited to accept or refuse a tracking cookie, but it may still be on your device somewhere.
- Adware. As with cookies, adware can be legitimate. Adverts on social media websites are examples of harmless adware, and these are typically chosen in response to your recent browsing history. Again, the darker side of this involves adverts being displayed by a third party without your permission or knowledge. This is often in the form of intrusive pop-up ads containing adult content.
- Trojans. As the name suggests, a Trojan is unwittingly allowed into a host device. It may lie dormant for a while, but its activation will almost inevitably involve some form of privacy invasion. Some Trojans are designed to steal personal data, while others may erase documents and files or use the computer as a slave terminal for mass online spamming. Trojans often enable external users to directly access private content like emails and photographs.
Due to its design of operating by stealth, spyware often goes undetected – it can be hard to identify any symptoms other than by a drop in processing/download speeds. Avoiding malware in the first place can be equally challenging as it’s often hidden within innocent web pages or piggybacked onto legitimate software downloads. Microsoft’s Internet Explorer is particularly susceptible to spyware, although recent news of IE’s impending demise may encourage hackers and programmers to focus their energies on other web browsers instead.
One way to test for malware is by installing and running a dedicated package like Ad-Aware or Spybot Search & Destroy. These free programs identify and permanently erase incriminating malware, though some spyware can actually block them from operating properly. Windows Defender does a decent job of protecting Microsoft operating systems from incoming dangers, while most antivirus packages also incorporate preventative measures to stop spyware getting through in the first place. Regularly deleting your browsing history is a useful additional tip.
If a device does become infected, it may be necessary to save your personal documents onto a data key and format the computer back to its factory settings. It’s an extreme solution, but the alternative may be sharing your every keystroke and password with an anonymous (and potentially malicious) audience…