Part of the Wireless and mobile glossary:

In mobile computing, snoopware is malware that is capable of monitoring activity on a smartphone. Snoopware can run in stealth mode to monitor phone calls, text messages, voicemail and e-mail or it can be used to turn on the phone's camera and microphone without the user's knowledge. Snoopware is almost always delivered to a smartphone by a text message or multi-media message. Users are cautioned against opening messages from people they do not know.

Learn More

Mobile viruses evolving beyond just 'nuisance'

Symantec: Heavy price for smartphone security inaction

 

Related Definitions: 

spyware 
keystroke logger
government Trojan

This was last updated in October 2008
Posted by: Margaret Rouse

Related Terms

Definitions

  • virtual assistant

    - A virtual assistant is an electronic audio or audio/video avatar-centered program that uses artificial intelligence to perform tasks for the user. Virtual assistants have existed in concept for yea... (WhatIs.com)

  • bring your own apps (BYOA)

    - Bring your own apps (BYOA) is the trend toward employee use of third-party applications and cloud services in the workplace. BYOA, like the BYOD trend towards user-owned devices in the workplace, i... (WhatIs.com)

  • GPS tracking

    - GPS tracking is the surveillance of location through use of the Global Positioning System (GPS ) to track the location of an entity or object remotely. The technology can pinpoint longitude, latitu... (WhatIs.com)

Glossaries

  • Wireless and mobile

    - Terms related to wireless and mobile technology, including definitions about consumer mobile technology devices and communication technologies such as Wi-Fi, WiMAX and LTE.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About snoopwarePowered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.