Best Viewed With Firefox, Chrome or Safari
Copyright (c) 2006-2016 Coenraad de Beer
Cyber Top Cops - The Cyber Security Experts
Bringing Law and Order to the Cyber World
Copyright © 2006-2016 Coenraad de Beer


About Us Contact Us Support Us
Custom Search
Bookmark and Share RSS Feeds

 

Adware and Spyware the same difference

Adware is the cousin of spyware. People are made to believe that there is a difference between the two by giving it another name. Adware is mainly used as a marketing tool to monitor people's behaviour on the Internet, to determine which products they are interested in. Spyware reports these statistics to its creators while adware supposedly doesn't. Adware is sometimes the carrier (Trojan Horses) of spyware and viruses and is hard to get rid off. Anti-spyware software also removes adware, for one simple reason, it falls under the same category as spyware and has the same characteristics as spyware. Some adware programs are bundled with free software packages and when you remove the adware from these packages, you render the software useless. Rendering the software useless is a small price to pay compared to the threat posed by the adware. Software that needs adware to operate can't be that legitimate after all.

Other adware programs breach your system through browser vulnerabilities and certain web sites exploit security holes to install adware on your system. Rootkits are used to hide adware from the user and backup programs (adware guards) reload the adware into the memory if you try to close them. Spyware uses exactly the same techniques to infiltrate and maintain itself on your system. Another characteristic of adware is the consumption of system resources, also common among spyware. Adware is labelled as legitimate software. How can you call it legitimate software if they hide themselves from the user, refuses to leave your system and keep all the system resources for themselves? You never know what they are busy doing behind the scenes. Legitimacy and transparency goes hand in hand when it comes to software. Software that is not transparent in its actions and the information it collects can never be called legitimate software.

For further reading, refer to our article Why Distinguish Between Spyware And Adware?


SpywareGuide Articles

Articles on Spyware, Adware, Malware and privacy in general

DATA-THEFT WORM TARGETING GOOGLE'S ORKUT
21 Feb 2007 12:59:34 CST
FaceTime Security Labs announced the discovery of a worm that steals users? banking details, usernames and passwords. The worm, known as MW.Orc, is propagating through Orkut, Google?s social networking site, as users launch an executable file disguised as a JPEG. Google has a temporary fix in place

Steganography- Hiding Information Inside of Information
06 Jul 2006 05:21:42 CST
Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message; this is in contrast to cryptography, where the existence of the message itself is not disguised, but the content is obscured. The word "S

Self-Propagating Worm Installs Unsafe "Safety Browser"
23 May 2006 05:06:59 CST
Research experts at FaceTime Security Labs identified and reported a new threat today affecting Yahoo! Messenger. A self-propagating worm, named yhoo32.explr, installs "Safety Browser" and hijacks the Internet Explorer homepage, leading users to a site that puts spyware on their PCs. Because Safety

Spyware Warriors: The Digital Underground Part One - Read the Transcript
25 Apr 2006 08:41:19 CST
One fateful day, while walking the halls of a CNET spyware conference last year Wayne Porter meets up with Chris Boyd and they team to make-up one of the key elements in Facetime Communication's Security Labs. This is a transcript from part one of their interview with Jeff Molander at Thoughtshapers

Spyware Warriors and the Digital UnderGround: Part 1 Podcast
23 May 2006 04:34:53 CST
Ever wonder what goes down in the back channels and dark alleys of the Internet? How spyware hunters find and penetrate botnets? Don't just read about- now you can hear it on your PC, download it to your iPod or device of your choice. SpywareGuide articles are sponsored by FaceTime Communications,