{"componentChunkName":"component---src-templates-dictionary-term-tsx","path":"/dictionary/antispyware","result":{"data":{"contentfulDictionaryTerm":{"title":"Antispyware","slug":"antispyware","descriptionMeta":{"childMarkdownRemark":{"rawMarkdownBody":"Understand the different types of spyware, how they can compromise your privacy, and how to protect yourself from these malicious attacks with anti-spyware."}},"body":{"body":"# What's spyware?\nSpyware is a type of malware that lets others spy on you through your devices, accessing everything you do, including your past activities and history. \n\nThink about how much your everyday life revolves around your online activities, from storing contacts and photos to holding sensitive information like banking details and health records. Naturally, you wouldn’t want anyone snooping around your personal details without your consent. \n\nSadly, that's exactly what spyware does. To combat spyware, several companies have developed anti-spyware programs specifically designed to protect you from these intrusions.\n\n![Antispyware](//images.ctfassets.net/18tcvm6gnkis/6rlofwQFaefa0thjcKsTLn/8e4b408dc3cfcf507a714d963a1d24dd/Antispyware.jpg)\n\n## What's anti-spyware?\nAnti-spyware is a software tool similar to antivirus programs. While some anti-spyware programs focus exclusively on blocking spyware, others are designed to combat both spyware and other types of [malware](https://guard.io/dictionary/malware \"Guardio Dictionary - What's malware?\"). The main function of anti-spyware is to protect your device from various cybersecurity threats, including viruses.\n\nThese programs work by monitoring data from websites, emails, and file downloads to prevent spyware from infiltrating your device’s operating system. Additionally, developers regularly update anti-spyware software to ensure it can defend against the latest known threats, keeping your system secure against evolving spyware tactics.\n\n## Risks and impacts of spyware programs\nIf you do end up with spyware on your device, it can collect information like passwords, financial information, hobbies, and even shopping preferences. The data is typically sent back to the spyware's creator or sold to third parties, including criminals who may use it for financial gain on [dark web](https://guard.io/dictionary/dark-web \"Guardio Dictionary - What's the dark web?\") forums.\n\n## Different types of spyware programs\n### 1. Keyloggers\nKeyloggers are programs designed to record keystrokes on a device to collect data, including sensitive information. While they can serve legitimate purposes, such as allowing employers to monitor their staff's activities or aiding law enforcement in criminal investigations, keyloggers are often exploited by hackers. Criminals use these tools to steal personal identifiable information (PII), passwords, and other sensitive data, posing significant security risks.\n\n### 2. Data stealers\nData or information stealers are specialized programs that retrieve targeted information from your device. They not only track the types of websites or applications you use but also directly extract critical details such as your login credentials and personal identifiable information (PII). These programs go beyond capturing data as you type; they can also access and take your media files and documents, broadening the scope of the information they compromise.\n\n### __3. system monitors__\nThese programs represent the most advanced category of spyware and are sometimes employed by nation-states or law enforcement agencies. Like typical spyware, they can track your browsing habits, application usage, and keystrokes. However, they also have enhanced capabilities such as capturing video from your device's camera, recording audio from the microphone, and collecting GPS location data.\n\nAdvanced spyware systems, such as NSO Group’s Pegasus, take it a step further by recording end-to-end encrypted conversations from messaging platforms like the device's native messaging feature, WhatsApp, or Signal. This level of surveillance allows for comprehensive monitoring of a user's communications.\n\n### __4. banking trojans__\nBanking trojans, like [Emotet](https://en.wikipedia.org/wiki/Emotet \"Wikipedia - Emotet\") and [Kronos](https://edition.cnn.com/2021/12/16/tech/kronos-ransomware-attack/index.html \"CNN - Kronos ransomware attack could impact employee paychecks and timesheets for weeks\"), are a specialized type of spyware focused on financial targets. These programs are typically used to attack banks and other financial institutions, aiming to steal sensitive data processed by these systems. Their targeted approach allows them to specifically disrupt and exploit financial transactions and information. \n\n### __5. Adware and tracking cookies__\nThis type of spyware tracks your [browser activities](https://guard.io/dictionary/adware \"Guardio Dictionary - What's adware?\"), including your history, downloads, and searches. The information gathered can then be sold to third parties for profit or used to inject malicious ads into your browsing experience. While this form of spyware generally refers to malicious programs, it can also apply to legitimate software or browser add-ons that collect user information without permission.\n\n## How spyware impacts devices\nSpyware has traditionally been known to slow down device processors, but this effect is becoming less noticeable as devices grow more powerful. However, there are other signs that may indicate your device is infected with spyware:\n\n- Unexpected changes to your browser's homepage or new add-ons installed without your permission.\n\n- Device features like the webcam and microphone being activated without your knowledge.\n\n- Slower system performance during certain actions.\nAnti-malware and anti-spyware software not functioning properly.\n\n- Your device connecting to known malicious or unwanted servers.\n\nMoreover, spyware is not always designed for efficiency. Errors in malicious programs can sometimes cause your system to crash, which is another clear sign that spyware may be present on your device.\n\nFortunately, there are ways to combat this issue. [Anti spyware programs](https://guard.io/plans \"Guardio Plans page\") are specifically designed to detect, block, and remove spyware, offering a crucial line of defense against these intrusive programs. \n\n### Staying Safe\n[Guardio's](https://guard.io/plans \"Guardio Plans page\") antispyware tools, protect you from spyware and other online scams. It blocks phishing attacks, secures your social accounts, and keeps you informed about potential breaches.\n\n#### Why Guardio?\nWith over 1.5 million happy customers, Guardio is your #1 ally in the digital age. Offering tools and alerts to keep scammers at bay. Try it out with a [7-day free trial](https://guard.io/plans \"Guardio Plans page\") and see how it strengthens your online security!","childMarkdownRemark":{"htmlAst":{"type":"root","children":[{"type":"element","tagName":"h1","properties":{"id":"whats-spyware","style":"position:relative;"},"children":[{"type":"text","value":"What's spyware?"},{"type":"element","tagName":"a","properties":{"href":"#whats-spyware","ariaLabel":"whats spyware permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Spyware is a type of malware that lets others spy on you through your devices, accessing everything you do, including your past activities and history."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Think about how much your everyday life revolves around your online activities, from storing contacts and photos to holding sensitive information like banking details and health records. Naturally, you wouldn’t want anyone snooping around your personal details without your consent."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Sadly, that's exactly what spyware does. To combat spyware, several companies have developed anti-spyware programs specifically designed to protect you from these intrusions."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-wrapper"],"style":"position: relative; display: block; ; max-width: 500px; margin-left: auto; margin-right: auto;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-background-image"],"style":"padding-bottom: 100%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAMCAgMCAgMDAwMEAwMEBQgFBQQEBQoHBwYIDAoMDAsKCwsNDhIQDQ4RDgsLEBYQERMUFRUVDA8XGBYUGBIUFRT/2wBDAQMEBAUEBQkFBQkUDQsNFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBT/wAARCAAoACgDAREAAhEBAxEB/8QAGQAAAgMBAAAAAAAAAAAAAAAAAAcGCAkF/8QALhAAAQQBAwIEAwkAAAAAAAAAAgEDBAUGAAcRCBITITFBCWGRFRYXIjNCUXGB/8QAGQEBAAMBAQAAAAAAAAAAAAAAAAIDBAUB/8QAJREAAgICAgEEAgMAAAAAAAAAAQIAEQMEEiFBBRMxUWFxIjLB/9oADAMBAAIRAxEAPwDVPSIaRErvJv3e7aZQFNWYczbNlCGYljYXDUCOSqRoTY9wqpEiByvCfuTXO2dwazBSpNzqaumuypYvUkWxe9EbezGJtiFVJorGumnXz62U4DhMuiIknBivBCQmJIqey60YM67C8llG3qtquEJsEWCIyNaZihpENIlXOt3I9rKGropG4V5XMS4ZrLg1DpE5LkmBAQmyyHJEoEiLyqcfPWHaTOwBwNRHj7mzXfCpIzLf+Tr9FOVbTZBg9su2dzGsJ8uZ9q30ZQVmW1KeRERXWS4IfJvtReOF7F4XWjCrJjAc2fMpzOruSgoeJYzV0phpEiW7Wb/hrthlWUpGdmu1Fa/LaisB3uPuiCq22A+5EXaKJ7qqJpEy860Ol6TtNs/iO5uT3ku+3It7BsMvsbGYrgArzJmLTALwgNNup2CiInkv0jyW+N9yXE1dSb/B6oX5uW7r5QDRrWLHr61iSn6briK8biCvovbyH11KRmnOkQ0iL/eHuchY7H4Q25FqIONkiKJojDxIiov8EIr/AGiammrh3G9nOP4/g18TLs7OXUxHLh/t+RfzF3f7aYlfkEK2xuutGPEQkZnRheb59y4JFTu81XnXOTax4PUBq8bPILZq6rz1Z/dzxsebLpHPzromu/m/HdD9SW7CY7U4q3lVdR1kWnrAsANuHCZRpoFJhtSVBHhEVV8113d1Fx5QqiuhMvpuRsuAsxvsxr6wTqw0iVN6l6zfXc64aqcRxd6lxutk+OzYM2sdmXLdQSHv5Q+Ww4IuB9V58+PTUlYqbUyLKrimFiJstg+pQmhJZF4Rr6h942/L/fE17za+Xn78yv2cdca6+o1unCi332myB+JkeLyMgx20kC5LfkW8d2VFPsQPEAlc/OKII8gvzVF58lM7ObY2ZJMaYxxQUJcDUJZP/9k='); background-size: cover; display: block;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"img","properties":{"className":["gatsby-resp-image-image"],"style":"width: 100%; height: 100%; margin: 0; vertical-align: middle; position: absolute; top: 0; left: 0; box-shadow: inset 0px 0px 0px 400px white;","alt":"Antispyware","title":"","src":"https://images.ctfassets.net/18tcvm6gnkis/6rlofwQFaefa0thjcKsTLn/8e4b408dc3cfcf507a714d963a1d24dd/Antispyware.jpg","srcSet":["https://images.ctfassets.net/18tcvm6gnkis/6rlofwQFaefa0thjcKsTLn/8e4b408dc3cfcf507a714d963a1d24dd/Antispyware.jpg?w=125 125w","https://images.ctfassets.net/18tcvm6gnkis/6rlofwQFaefa0thjcKsTLn/8e4b408dc3cfcf507a714d963a1d24dd/Antispyware.jpg?w=250 250w","https://images.ctfassets.net/18tcvm6gnkis/6rlofwQFaefa0thjcKsTLn/8e4b408dc3cfcf507a714d963a1d24dd/Antispyware.jpg?w=500 500w"],"sizes":"(max-width: 500px) 100vw, 500px","loading":"lazy"},"children":[]},{"type":"text","value":"\n "}]},{"type":"text","value":"\n "}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h2","properties":{"id":"whats-anti-spyware","style":"position:relative;"},"children":[{"type":"text","value":"What's anti-spyware?"},{"type":"element","tagName":"a","properties":{"href":"#whats-anti-spyware","ariaLabel":"whats anti spyware permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Anti-spyware is a software tool similar to antivirus programs. While some anti-spyware programs focus exclusively on blocking spyware, others are designed to combat both spyware and other types of "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/dictionary/malware","title":"Guardio Dictionary - What's malware?"},"children":[{"type":"text","value":"malware"}]},{"type":"text","value":". The main function of anti-spyware is to protect your device from various cybersecurity threats, including viruses."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"These programs work by monitoring data from websites, emails, and file downloads to prevent spyware from infiltrating your device’s operating system. Additionally, developers regularly update anti-spyware software to ensure it can defend against the latest known threats, keeping your system secure against evolving spyware tactics."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h2","properties":{"id":"risks-and-impacts-of-spyware-programs","style":"position:relative;"},"children":[{"type":"text","value":"Risks and impacts of spyware programs"},{"type":"element","tagName":"a","properties":{"href":"#risks-and-impacts-of-spyware-programs","ariaLabel":"risks and impacts of spyware programs permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"If you do end up with spyware on your device, it can collect information like passwords, financial information, hobbies, and even shopping preferences. The data is typically sent back to the spyware's creator or sold to third parties, including criminals who may use it for financial gain on "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/dictionary/dark-web","title":"Guardio Dictionary - What's the dark web?"},"children":[{"type":"text","value":"dark web"}]},{"type":"text","value":" forums."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h2","properties":{"id":"different-types-of-spyware-programs","style":"position:relative;"},"children":[{"type":"text","value":"Different types of spyware programs"},{"type":"element","tagName":"a","properties":{"href":"#different-types-of-spyware-programs","ariaLabel":"different types of spyware programs permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{"id":"1-keyloggers","style":"position:relative;"},"children":[{"type":"text","value":"1. Keyloggers"},{"type":"element","tagName":"a","properties":{"href":"#1-keyloggers","ariaLabel":"1 keyloggers permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Keyloggers are programs designed to record keystrokes on a device to collect data, including sensitive information. While they can serve legitimate purposes, such as allowing employers to monitor their staff's activities or aiding law enforcement in criminal investigations, keyloggers are often exploited by hackers. Criminals use these tools to steal personal identifiable information (PII), passwords, and other sensitive data, posing significant security risks."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{"id":"2-data-stealers","style":"position:relative;"},"children":[{"type":"text","value":"2. Data stealers"},{"type":"element","tagName":"a","properties":{"href":"#2-data-stealers","ariaLabel":"2 data stealers permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Data or information stealers are specialized programs that retrieve targeted information from your device. They not only track the types of websites or applications you use but also directly extract critical details such as your login credentials and personal identifiable information (PII). These programs go beyond capturing data as you type; they can also access and take your media files and documents, broadening the scope of the information they compromise."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{"id":"3-system-monitors","style":"position:relative;"},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"3. system monitors"}]},{"type":"element","tagName":"a","properties":{"href":"#3-system-monitors","ariaLabel":"3 system monitors permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"These programs represent the most advanced category of spyware and are sometimes employed by nation-states or law enforcement agencies. Like typical spyware, they can track your browsing habits, application usage, and keystrokes. However, they also have enhanced capabilities such as capturing video from your device's camera, recording audio from the microphone, and collecting GPS location data."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Advanced spyware systems, such as NSO Group’s Pegasus, take it a step further by recording end-to-end encrypted conversations from messaging platforms like the device's native messaging feature, WhatsApp, or Signal. This level of surveillance allows for comprehensive monitoring of a user's communications."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{"id":"4-banking-trojans","style":"position:relative;"},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"4. banking trojans"}]},{"type":"element","tagName":"a","properties":{"href":"#4-banking-trojans","ariaLabel":"4 banking trojans permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Banking trojans, like "},{"type":"element","tagName":"a","properties":{"href":"https://en.wikipedia.org/wiki/Emotet","title":"Wikipedia - Emotet"},"children":[{"type":"text","value":"Emotet"}]},{"type":"text","value":" and "},{"type":"element","tagName":"a","properties":{"href":"https://edition.cnn.com/2021/12/16/tech/kronos-ransomware-attack/index.html","title":"CNN - Kronos ransomware attack could impact employee paychecks and timesheets for weeks"},"children":[{"type":"text","value":"Kronos"}]},{"type":"text","value":", are a specialized type of spyware focused on financial targets. These programs are typically used to attack banks and other financial institutions, aiming to steal sensitive data processed by these systems. Their targeted approach allows them to specifically disrupt and exploit financial transactions and information."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{"id":"5-adware-and-tracking-cookies","style":"position:relative;"},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"5. Adware and tracking cookies"}]},{"type":"element","tagName":"a","properties":{"href":"#5-adware-and-tracking-cookies","ariaLabel":"5 adware and tracking cookies permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"This type of spyware tracks your "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/dictionary/adware","title":"Guardio Dictionary - What's adware?"},"children":[{"type":"text","value":"browser activities"}]},{"type":"text","value":", including your history, downloads, and searches. The information gathered can then be sold to third parties for profit or used to inject malicious ads into your browsing experience. While this form of spyware generally refers to malicious programs, it can also apply to legitimate software or browser add-ons that collect user information without permission."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h2","properties":{"id":"how-spyware-impacts-devices","style":"position:relative;"},"children":[{"type":"text","value":"How spyware impacts devices"},{"type":"element","tagName":"a","properties":{"href":"#how-spyware-impacts-devices","ariaLabel":"how spyware impacts devices permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Spyware has traditionally been known to slow down device processors, but this effect is becoming less noticeable as devices grow more powerful. However, there are other signs that may indicate your device is infected with spyware:"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ul","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Unexpected changes to your browser's homepage or new add-ons installed without your permission."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Device features like the webcam and microphone being activated without your knowledge."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Slower system performance during certain actions."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Anti-malware and anti-spyware software not functioning properly."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ul","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"Your device connecting to known malicious or unwanted servers."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Moreover, spyware is not always designed for efficiency. Errors in malicious programs can sometimes cause your system to crash, which is another clear sign that spyware may be present on your device."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Fortunately, there are ways to combat this issue. "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/plans","title":"Guardio Plans page"},"children":[{"type":"text","value":"Anti spyware programs"}]},{"type":"text","value":" are specifically designed to detect, block, and remove spyware, offering a crucial line of defense against these intrusive programs."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{"id":"staying-safe","style":"position:relative;"},"children":[{"type":"text","value":"Staying Safe"},{"type":"element","tagName":"a","properties":{"href":"#staying-safe","ariaLabel":"staying safe permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"a","properties":{"href":"https://guard.io/plans","title":"Guardio Plans page"},"children":[{"type":"text","value":"Guardio's"}]},{"type":"text","value":" antispyware tools, protect you from spyware and other online scams. It blocks phishing attacks, secures your social accounts, and keeps you informed about potential breaches."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h4","properties":{"id":"why-guardio","style":"position:relative;"},"children":[{"type":"text","value":"Why Guardio?"},{"type":"element","tagName":"a","properties":{"href":"#why-guardio","ariaLabel":"why guardio permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"With over 1.5 million happy customers, Guardio is your #1 ally in the digital age. Offering tools and alerts to keep scammers at bay. Try it out with a "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/plans","title":"Guardio Plans page"},"children":[{"type":"text","value":"7-day free trial"}]},{"type":"text","value":" and see how it strengthens your online security!"}]}],"data":{"quirksMode":false}}}}}},"pageContext":{"title":"Antispyware","slug":"antispyware","keepLearning":[{"title":"Antivirus","slug":"antivirus"},{"title":"Authentication","slug":"authentication"},{"title":"Autorun worm","slug":"autorun-worm"}],"breadcrumb":{"location":"/dictionary/antispyware","crumbs":[{"pathname":"/","crumbLabel":"Homepage"},{"pathname":"/dictionary","crumbLabel":"dictionary"},{"pathname":"/dictionary/antispyware","crumbLabel":"antispyware"}]}}},"staticQueryHashes":["1614255152"]}