contact contact contact
  Articles | Editorials | Reviews | InfoSec Directory | News | Press Releases
Introduction to Spyware Keyloggers
Thursday, 14 April 2005, 18:42 GMT

Spyware is a categorical term given to applications and software that log information about a user's online habits and report back to the software's creators.

The effects of these programs range from unwanted pop-up ads and browser hijacking to more dangerous security breaches, which include the theft of personal information, keystroke logging, changing dialup ISP numbers to expensive toll numbers, and installing backdoors on a system that leave it open for hackers.

Read More at SecurityFocus

Back to main page


SecurityWatch - 24x7 advisory and vulnerability automated monitoring service.

GFI LANguard Network Security Scanner - Network-wide security vulnerability scanning & fixing - Free version available.

Network Security Software - Sponsored by GFI Network Security.

InfoSec Directory
» Smart-Phone Attacks and Defenses
» Preventing Spyware Infestation
» Preliminary study: Bluetooth Security
» An initiative extending SMTP to include email sender identity and reputation
» Identity Assurance in a Virtual World
Latest Press Releases
» Open Door Networks Announces The Doorstop X Firewall
» Defence Plus 2.0: Unyielding Line of Defence against Hacker Intrusion
» Enterprise Strategy Group Highlights Application Security, Inc. for Uniquely Addressing the Complete Application Security Lifecycle
» Elemental Names Google Executive To Its Board Of Directors, Further Broadens Experience Of Security Compliance Management Provider
» Arbor Networks Launches New Network Security and Management Platform for Service Providers
» 802.11 Wireless Networks: The Definitive Guide, Second Edition
More Articles
» Voice and Data Convergence - a Vendor’s Perspective
» Making Firewall Do the Work: Stateful Packet Inspection
» Four Things You Must Know Before Deploying Wireless LANs
» Put spyware on the security map
» Interview with Brian Carrier, author of “File System Forensic Analysis"
 Copyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: Privacy 
Site Meter