SlideShare a Scribd company logo
1 of 11
By:
BINITHA A
MANNAM FOUNDATION CENTRE FOR EDUCATION EDAKKADU P O,
PORUVAZHY
SOCIAL SCIENCE
REG NO -16915373005
 The word 'spyware' was used for the first time
publicly in October 1995.
 It popped up on Usenet (a distributed Internet
discussion system in which users post e-mail
like messages) in an article aimed at Microsoft's
business model.
 Spyware refers to programs that use your
Internet connection to send information from
your personal computer to some other
computer, normally without your knowledge
or permission.
 This information is a record of your ongoing
browsing habits, downloads, or it could be
more personal data like your name and
address.
 Most spyware is installed without users'
knowledge.
 Spyware gets on a system through deception of
the user or through exploitation of software
vulnerabilities.
 Most of the time it is bundled with some sort of
other software that the user has downloaded.
 A spyware infestation can create significant
unwanted CPU activity, disk usage, and
network traffic.
 Stability issues, such as applications freezing,
failure to boot, and system-wide crashes, are
also common.
 Spyware, which interferes with networking
software commonly causes difficulty
connecting to the Internet.
 Some types of spyware disable software
firewalls and anti-virus software, and/or
reduce browser security settings, thus opening
the system to further opportunistic infections,
much like an immune deficiency disease.
 Some other types of spyware use rootkit like
techniques to prevent detection, and thus
removal.
 Spyware is still changing, meaning remedies
can vary from different types of spyware.
 If programs do not work to rid the computer of
the infected then a full system reinstall would
be needed.
 Most big anti-virus firms have added anti-
spyware to their anti-virus packages. (Such as
Macafee and Symantec)
1. They can provide real time protection against
the installation of spyware software on your
computer.
2. Anti-spyware software programs can be used
solely for detection and removal of spyware
software that has already been installed onto your
computer.
 CoolWebSearch
 Internet Optimizer
 HuntBar
 Movieland
 MyWebSearch
 Zango
 WeatherStudio
 Ad-Aware SE
 Spybot - Search & Destroy
 GIANT AntiSpyware
 AVG Anti-Spyware Professional Edition
History and Types of Spyware

More Related Content

What's hot

Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information securityAYESHA JAVED
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokeshLokesh Bysani
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Malware forensic
Malware forensicMalware forensic
Malware forensicSumeraHangi
 

What's hot (20)

Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
MALWARE
MALWAREMALWARE
MALWARE
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Malware
MalwareMalware
Malware
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Spyware
SpywareSpyware
Spyware
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Spyware
SpywareSpyware
Spyware
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Mobile security
Mobile securityMobile security
Mobile security
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
Cia security model
Cia security modelCia security model
Cia security model
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Malware forensic
Malware forensicMalware forensic
Malware forensic
 

Similar to History and Types of Spyware

Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
CYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxCYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxChaitanyaMundra2
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 

Similar to History and Types of Spyware (20)

Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Mitppt
MitpptMitppt
Mitppt
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
CYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxCYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptx
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
IT viruses
 IT viruses IT viruses
IT viruses
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Information security
Information securityInformation security
Information security
 

More from galaxy201 (20)

Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
teaching practice
teaching practiceteaching practice
teaching practice
 
Output
OutputOutput
Output
 
Digestive system ppt
Digestive system pptDigestive system ppt
Digestive system ppt
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
New doc 2017 02-11
New doc 2017 02-11New doc 2017 02-11
New doc 2017 02-11
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 

Recently uploaded

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

History and Types of Spyware

  • 1. By: BINITHA A MANNAM FOUNDATION CENTRE FOR EDUCATION EDAKKADU P O, PORUVAZHY SOCIAL SCIENCE REG NO -16915373005
  • 2.  The word 'spyware' was used for the first time publicly in October 1995.  It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsoft's business model.
  • 3.  Spyware refers to programs that use your Internet connection to send information from your personal computer to some other computer, normally without your knowledge or permission.  This information is a record of your ongoing browsing habits, downloads, or it could be more personal data like your name and address.
  • 4.  Most spyware is installed without users' knowledge.  Spyware gets on a system through deception of the user or through exploitation of software vulnerabilities.  Most of the time it is bundled with some sort of other software that the user has downloaded.
  • 5.  A spyware infestation can create significant unwanted CPU activity, disk usage, and network traffic.  Stability issues, such as applications freezing, failure to boot, and system-wide crashes, are also common.  Spyware, which interferes with networking software commonly causes difficulty connecting to the Internet.
  • 6.  Some types of spyware disable software firewalls and anti-virus software, and/or reduce browser security settings, thus opening the system to further opportunistic infections, much like an immune deficiency disease.  Some other types of spyware use rootkit like techniques to prevent detection, and thus removal.
  • 7.  Spyware is still changing, meaning remedies can vary from different types of spyware.  If programs do not work to rid the computer of the infected then a full system reinstall would be needed.  Most big anti-virus firms have added anti- spyware to their anti-virus packages. (Such as Macafee and Symantec)
  • 8. 1. They can provide real time protection against the installation of spyware software on your computer. 2. Anti-spyware software programs can be used solely for detection and removal of spyware software that has already been installed onto your computer.
  • 9.  CoolWebSearch  Internet Optimizer  HuntBar  Movieland  MyWebSearch  Zango  WeatherStudio
  • 10.  Ad-Aware SE  Spybot - Search & Destroy  GIANT AntiSpyware  AVG Anti-Spyware Professional Edition