![]() Some spams are circulated unknowingly through a common user who passes on chain letters, devotional messages, pleas for medical help, etc. These generate an infected e-mail from the systems of unsuspecting hosts. Some dangerous spams come from worms, not spammers. These spams may carry viruses or try to lure the user into providing some personal and financial information including user-ID, password, credit card number, etc. Most of the spams are used for fraudulent advertisements like won-lottery-jackpot announcements, get-rich-quick business opportunities, free gifts and work-at-home schemes. Spammers may also buy a list of e-mail addresses from a website that holds user information in its database. Spammers often use tools like ‘harvesters’ that scan the Internet and newsgroup and collect e-mail addresses. Spam is unsolicited junk e-mail that can take the form of advertisements, chain mail, bulk e-mail, threatening or abusive e-mail, etc. Theftware hijacks ad-space on webpages, replacing the ads space with its own ads. Drug dealerware offers free software and then shuts down and demands payments months later when one has presumably become used to it. Scumware is designed to steal traffic and revenue from legitimate websites. Some other kinds of malware (malicious software) include scumware, drug dealerware and theftware. Scareware can install malicious software that may steal information, make the system unstable or even crash it. ![]() Scareware is a software that creates fear in users by asking them to perform some kind of activity while threatening with the adverse effects of not following the guidelines. Some spyware can even spy on the user by exploiting his own webcam. One of the threats of spyware is key logging, which enables it to record anything that the user types, including the user’s passwords, credit card number, e-mail messages, chat messages, etc. Spyware installs itself without the user’s permission and often hides so that it is difficult to find and eradicate it from the system. Spyware is a software that is more likely engaged in antisocial activities such as sending personal information like passwords, credit card numbers and other confidential corporate information to its creators. After downloading the software, the user may start noticing more pop-up windows than usual. When the user downloads the software, the user has to click through a page of unintelligible legal stuff that includes some kind of copyright and usually permission to install adware along with the software. It is commonly acquired when a user downloads freeware or shareware like games. These software may pollute the user’s screen with ads and popups, send user information, slow down the user’s computer or even cause system crash.Īdware.Adware is designed to advertise a commercial offering. Typical forms of invasive software are adware, spyware, scareware, scumware, theftware and drug dealerware. All kinds of software that arrive on a user’s computer without permission or awareness of the user, or sometimes with user permission, are known as invasive software.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |