Posts

Showing posts with the label different types of spyware

Malicious apps return to Google play Store

Image
Security researchers from a software company, Symantec, recently discovered two new sets of malicious apps on the Google Play store . The first set of seven apps seems to have been re-uploaded under different names after being reported earlier. The other set of 38 apps, disguised as games and education apps, redirected victims to install other apps from the Play Store. They display advertisements and aim to drive traffic to some sites and the blog URLs are loaded in the background without the knowledge or permission of the user. There's also another set of 15 malicious apps reported that seem to open ads and download payload without the consent of the user. All these apps wait four hours before launching the “malicious activity” to evade any user suspicion. One may think that this may be because the people behind these apps may be using some sophisticated technology to fool Google. But, you may be surprised to know that the only thing these people do is to change the...

Different types of spyware

Image
There are four different types of spyware which have their own purpose and functions. They are mainly computer spyware and cell phone spyware. These four different spyware are related with each other, and all these four types of spyware can be present in a single system if it is seriously affected. These four types of spyware are Adware Trojans Tracking cookies System monitors 1.Adware: This type of spyware tracks information from the user like user’s browsing activity on the Internet and downloads to keep track of user’s intent. After this adware tracks the user’s activity like web searches, frequently visited websites and downloads, this adware then displays several types of ads like window ads or pop-up ads. These are done mainly for marketing purposes. 2.Trojans: Trojans are malicious software that often appear legitimate and fool people into accessing them by several social engineering techniques. Unlike other spyware, Trojan horses cannot install themselves au...