ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Spyware threats and its prevention

Updated on September 10, 2015
vvsoft profile image

14+ years of IT experience as Manager IT, Programmer, Center In charge, administrator and freelancer.

The computer users are under regular threat of being infected with different kinds of malicious codes, which are capable of compromising their data, monitoring their behavior, and also violating their privacy. One of the most common types of such malicious codes is the spyware program.

A spyware is a software application that has been programmed to covertly monitor and retrieve information about the computer user, or organization without their knowledge or consent. The retrieved information might be used for understanding the user behavior or fraudulent purposes by the criminal.

During recent years, the number of people connecting to the Internet has significantly increased due to mobile device growth and broadband connectivity which has become more widely available. Being connected to the Internet has many advantages and conveniences but not without a few disadvantages, one of which is the increased proliferation of malware.

As the population of the Internet increases, computer users are exposed to the consistent threat of malware being inserted onto their device without their knowledge or consent. Malware is comprised of small software applications which contain malicious code. It is designed by tech savvy programmers with malicious intentions and is capable of compromising user data, monitoring computer behavior, causing significant damage to an operating system and applications, and violating the user’s privacy. One of the most common types of such malicious codes is the spyware program.

According to an Economist (June 5, 2004) report, the top three spyware firms in the U.S. claimed their software is installed on 100 million PCs. Another survey conducted by Websense in April 2004 on firms with 100+ employees revealed that there are 92 percent of PCs which possess spyware installed on their computer knowing or unknowingly.

In recent years, the above numbers have nearly doubled with more than 80 percent of devices being infected with spyware and more than 91 percent of PC users that are aware of the existence of spyware, according to Information Week, 2012. (Information week)

Why are cyber criminals using spyware programs to infect their victims?

The spyware economy is currently worth more than $2 billion annually. The revenue originates from ads and bundled deals to unscrupulous sources which are malicious and designed to steal personal information for the purpose of financial gain on the part of the cybercriminal. Some spyware programs have even been linked to organized crime and intellectual property theft.

In order for the process to be operative, spyware programs are require to provide an end user experience that always works. This means the process of using a spyware application does not generate any revenue until an installation on the end user’s computer is successful. For this reason, money is a key motivator for cyber criminals to continually search for more creative ways to sneak into a user’s computer.

How can we combat and minimize the threats?

There are many methods and applications which are used to combat and minimize spyware threats. The process for minimizing the threats will vary according to whether you are an individual computer user or an enterprise organization which requires protection of sensitive data and trade secrets.

For the typical computer user, it is possible to combat and minimize spyware threats by deploying both an antivirus and anti-spyware application in addition to activating a firewall to monitor network traffic. In addition to deploying the proper protection applications, the end user should be streetwise when browsing the Internet, keep all software updated with the latest security patches, and run Windows updates on a consistent basis.

In terms of an enterprise organization, it is necessary to formulate a comprehensive framework to combat and minimize spyware threats. The framework must adequately address the needs of the organization and include staying updated on the future trends in the area of spyware threats.


Submit a Comment

No comments yet.


This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

Show Details
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)