Browse Definitions:
Definition

Spyware glossary

Print out for a handy reference guide or browse online to connect to full definitions and more information.

ActiveX -- a Web technology that enables the creation of portable modules and makes it possible for a browser to interact with desktop applications. Spyware is frequently downloaded through an ActiveX plug-in (see also JavaScript).

adware - any program that serves advertising while it runs. Many adware applications also track user information.

anonymizer -- a privacy service that allows a user to visit Web sites without allowing anyone to gather information about them.

back door -- a means of access to a computer program that bypasses security mechanisms. A programmer may sometimes install a back door so that the program can be accessed for troubleshooting or other purposes, but an attacker may exploit or use a back door to get unauthorized access to information or install spyware.

bluesnarfing -- theft of information from a wireless device using Bluetooth transmission. By exploiting a vulnerability in the way Bluetooth is implemented, an attacker can access information -- such as the user's calendar, contact list and e-mail and text messages -- without leaving any evidence of the attack.

bot -- a program that operates as an agent for a user or another program or simulates a human activity. Surfbots, used to facilitate Internet use, often include spyware. Spyware programs are sometimes known as spybots.

browser hijacker - a type of malware program that alters your computer's browser settings so that you are redirected to Web sites that you had no intention of visiting. Often works in conjunction with spyware.

bundling -- the practice of including multiple products in a package deal. Frequently, spyware is bundled with freeware or shareware products.

cache poisoning -- the corruption of an Internet server's domain name system table by replacing an Internet address with that of another, rogue address. When a Web user seeks the page with that address, the request is redirected by the rogue entry in the table to a different address. At that point, a worm, spyware, Web browser hijacking program, or other malware can be downloaded to the user's computer from the rogue location. Cache poisoning is also called domain name system (DNS) poisoning or DNS cache poisoning.

cookie - information about you that a Web site stores on your computer so it can access that information for future reference.

cookie poisoning -- the modification of a cookie by an attacker to gain unauthorized information about the user for purposes such as identity theft.

data integrity -- the assurance that information can only be accessed or modified by those authorized to do so.

digital signature -- an electronic means of authenticating someone's identity or ensuring that exchanged data has not been altered by unauthorized parties.

drive-by download -- a download that occurs without user knowledge or consent. Can occur as the result of visiting a specific Web site or by clicking a deceptive button on a pop-up window.

evil twin -- a home-made wireless access point (hot spot) that masquerades as a legitimate one to gather personal or corporate information without the end-user's knowledge.

encryption -- the conversion of data into ciphertext so that it cannot be understood by unauthorized parties.

firewall -- a set of programs that work in conjunction to protect a network or computer from external threats. Depending on configuration, provides some protection from worms and viruses, but is not typically as effective against spyware.

freeware -- software offered for free download. Sometimes includes adware and/or spyware as a means of offsetting costs or gaining revenue.

Kazaa -- a popular peer-to-peer file-sharing program that was widely reported to include spyware, especially in its earlier incarnations.

JavaScript -- an interpreted programming or script language that is used for Web development. JavaScript can be embedded in HTML pages and, like ActiveX controls, can be used to launch spyware programs from Web pages.

keystroke logger (also known as keylogger, key logger) -- a small hardware device or a program that records each keystroke typed on a particular keyboard for report back to an interested party, such as a marketer or an employer. Also used by unscrupulous individuals to gain access to information for identity theft and other illicit purposes.

identity theft -- illicit impersonation of a victim by accessing personal information, often used to obtain credit, merchandise, and services in the name of the victim, or to provide the thief with false credentials. Spyware is sometimes used to gather such information.

malware -- short for "malicious software", includes spyware, viruses, worms, and Trojan horses. Spyware is generally used for marketing purposes and, as such, not really malicious although it is generally unwanted. However, spyware can also be used to gather information for identity theft or other clearly illicit purposes.

personalization -- using information gathered about individual visitors to create customized pages for them and enhance customer service or e-commerce sales

phishing -- a method of tricking people into giving up their personal information. Sometimes associated with spyware; for example, perpetrators may get victims to click on a link that takes them to a Web site where they are subject to a drive-by download.

pop-up download -- a download initiated through a pop-up window, often engineered to trick the user into agreeing to a download, which may contain spyware.

potentially unwanted program (PUP) -- a program that may be unwanted, such as adware or spyware, despite the possibility that users consented to download it.

privacy -- online, this is the assurance that your personal information will not be accessed without your permission or distributed to third parties.

pseudonymous profile -- a collection of information about a particular computer user that identifies the user either by their computer's IP address or by a randomly-generated nickname. Often used for personalization or marketing purposes.

rootkit -- a set of programs used to hack into a system and gain administrative-level access. May also monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to circumvent detection.

shareware -- software that is distributed free on a trial basis with the understanding that the user may need or want to pay for it later. As with freeware, this sometimes contains adware or spyware as a means of offsetting costs or creating revenue.

spam -- unsolicited bulk e-mail. Recipients who click links in spam messages may put themselves at risk for spyware, viruses, and other malware.

spyware -- any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.

transient cookie -- a small file that stores user information temporarily and disappears when the browser is closed. Because user information is not stored on the hard drive, it cannot be accessed when the session is finished.

Trojan horse -- a program in which malicious code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk or tracking and reporting user information.

URL poisoning -- a method of tracking Web user behavior by adding an ID number to the URL line in a Web browser when a user visits a particular site. This ID number can then be used to determine which pages on the site the user visits thereafter.

virus -- a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can perform an almost endless number of activities on the host computer and sometimes install spyware.

war driving -- the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere. Because a wireless LAN may have a range that extends beyond an office building, an outside user may be able to intrude into the network, obtain a free Internet connection, and possibly gain access to company records and other resources.

This was last updated in May 2007

Continue Reading About Spyware glossary

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • ZFS

    ZFS is a local file system and logical volume manager created by Sun Microsystems to control the placement, storage and retrieval...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

SearchSolidStateStorage

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close