Corpus ID: 14386641

What is Spyware

@inproceedings{danjo2005WhatIS,
  title={What is Spyware},
  author={Daniel Jonasson danjo and liu. se Johan Sigholm johsi},
  year={2005}
}
During the last few years the termspywarehas become increasingly spread. The definition, though, is still quite indistinct. In this paper we strive to explain what spyware really is, what types and forms it comes in, and examine how it relates to other forms of malicious software. We take a closer look at one instance of especially malicious spyware and also at a number of anti-spyware programs that are out on the market. Finally we compile a list of recommendations on how to protect oneself… Expand
1 Citations
SEC-C-U: The Security of Intensive Care Unit Medical Devices and Their Ecosystems
TLDR
A taxonomy based on the functionality of 19 widely used ICUMDs is presented, providing an explanation of each device’s medical role, properties, interactions, and how they impact each other's security, leaving the devices and the patients vulnerable to cyber-attacks. Expand

References

SHOWING 1-10 OF 47 REFERENCES
Measurement and Analysis of Spyware in a University Environment
TLDR
By examining four widespread programs (Gator, Cydoor, SaveNow, and eZula), a detailed analysis of their behavior is presented, from which signatures that can be used to detect their presence on remote computers through passive network monitoring are derived. Expand
User Confidence-and the Software Developer
TLDR
Industry because each of these applications needs someone to develop and maintain them and the effect of widespread security threats such as spyware and viruses on the confidence of online users who, like myself, have started to do more and more of their everyday business online. Expand
FTC cracks down on spyware and PC hijacking, but not true lies
The US Federal Trade Commission (FTC) recently sued an Internet marketing organization to make it stop infecting consumers' PCs with spyware. According to the FTC, Seismic Entertainment ProductionsExpand
Invasive Software: Who's Inside Your Computer?
TLDR
The paper discusses new invasive software such as Spyware, pop-over ads, e-mail tracking and Magic Lantern software. Expand
A day in the life of spies - spyware everywhere.http://www.spywareguide.com
  • 2005
Available at <http://www
  • Available at <http://www
  • 2005
Bho's -browser helper objects
  • Bho's -browser helper objects
  • 2005
Comparison of Unwanted Software Installed by P2P Programs
  • Available at <http://www.benedelman.org/spyware/p2p/ >. Updated March 7,
  • 2005
Comparison of Unwanted Software Installed by P2P Programs. Available at <http://www.benedelman.org/spyware/p2p
  • Comparison of Unwanted Software Installed by P2P Programs. Available at <http://www.benedelman.org/spyware/p2p
  • 2005
Court: Wife broke law with spyware
  • Available at <http://news.zdnet.com/2100-1009_22-5577979.html>. February 15,
  • 2005
...
1
2
3
4
5
...