Tell Unwelcome Spyware to Pack its Bags! |
by Steve Gibson, Gibson Research Corporation |
Internet Connection Misuse & Abuse![]() For many years, the big problem has been software viruses written by malicious teenage hackers finding their way into our personal computers to set up shop with their own agendas. But today we face a new and even more insidious threat: ![]() model" is the exploitation of consumer trust and ignorance, are sneaking their spyware systems into our machines for their own purposes.
The news media has carried many stories about Real Networks who were reportedly caught 'red handed' secretly profiling their users' listening habits, Aureate/Radiate and Conducent Technologies whose advertising, monitoring, and profiling software sneaks into our machines without our knowledge or permission, Comet Cursor which secretly tracks our web browsing, GoHip who hijacks our web browser and alters our eMail signatures . . . and many other hopeful and exploitive newcomers on the horizon.
contents of this page before you proceed: ![]() ![]() ![]() Click on the button above to view the page.
|
to us has entered their machine, and provides the option of immediate or later removal.
![]() ![]()
|
![]() |
![]() | Gibson Research Corporation is owned and operated by Steve Gibson. The contents of this page are Copyright (c) 2024 Gibson Research Corporation. SpinRite, ShieldsUP, NanoProbe, and any other indicated trademarks are registered trademarks of Gibson Research Corporation, Laguna Hills, CA, USA. GRC's web and customer privacy policy. |
Last Edit: May 28, 2010 at 11:28 (5,371.49 days ago) | Viewed 27 times per day |