ESET Online Help

Search English
Select the topic

Spyware

This category covers all applications which send private information without user consent/awareness. Spyware uses tracking functions to send various statistical data such as a list of visited websites, email addresses from the user‘s contact list, or a list of recorded keystrokes.

The spyware authors claim these techniques aim to discover more about users’ needs and interests and allow better-targeted advertisements. The problem is that there is no clear distinction between useful and malicious applications, and no one can be sure that the retrieved information will not be misused. The data obtained by spyware applications may contain security codes, PINs, bank account numbers, etc. Spyware is often bundled with free versions of a program by its author to generate revenue or to offer an incentive for purchasing the software. Often, users are informed of the presence of spyware during a program‘s installation to give them an incentive to upgrade to a paid version without it.

Examples of well-known freeware products that come bundled with spyware are client applications of P2P (peer-to-peer) networks. Spyfalcon or Spy Sheriff (and many more) belong to a specific spyware subcategory. They appear to be antispyware programs, but they are spyware programs themselves.

If a file is detected as spyware on your computer, it is advisable to delete it because it is highly likely to contain malicious code.

As a subcategory of spyware, keyloggers can be hardware or software-based. Software-based keyloggers can only collect the information typed into a single website or app. More sophisticated keyloggers can record everything you type, including the information you copy/paste. Some keyloggers targeting mobile devices can record calls, information from messaging applications, locations, or even microphone and camera captures.