2017-07-30T09:47:39+03:00[Europe/Moscow] en true Backdoor (computing), Computer and network surveillance, Trojan horse (computing), Flame (malware), Windows Genuine Advantage, Carrier IQ, Phorm, Movieland, Hacking Team, Magic Lantern (software), Gh0st RAT, Privacy-invasive software, Computer and Internet Protocol Address Verifier, BonziBuddy, Comet Cursor flashcards
Spyware

Spyware

  • Backdoor (computing)
    A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc.
  • Computer and network surveillance
    Computer and network surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet.
  • Trojan horse (computing)
    (For other uses, see Trojan horse (disambiguation).) In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent.
  • Flame (malware)
    (Not to be confused with Stoned (computer virus) § Flame/Stamford.) Flame, also known as Flamer, sKyWIper, and Skywiper, is modular computer malware discovered in 2012 that attacks computers running the Microsoft Windows operating system.
  • Windows Genuine Advantage
    Windows Genuine Advantage (WGA) is an anti-infringement system created by Microsoft that enforces online validation of the licensing of several recent Microsoft Windows operating systems when accessing several services, such as Windows Update, and downloading Windows components from the Microsoft Download Center.
  • Carrier IQ
    Carrier IQ was a privately owned mobile software company founded in 2005 in Sunnyvale, California.
  • Phorm
    Phorm, formerly known as 121Media, was a digital technology company known for its contextual advertising software.
  • Movieland
    Movieland, also known as Movieland.
  • Hacking Team
    HackingTeam is a Milan-based information technology company that sells offensive intrusion and surveillance capabilities to governments, law enforcement agencies and corporations.
  • Magic Lantern (software)
    Magic Lantern is keystroke logging software developed by the United States' Federal Bureau of Investigation.
  • Gh0st RAT
    Gh0st RAT is a Trojan horse for the Windows platform that the operators of GhostNet used to hack into some of the most sensitive computer networks on Earth.
  • Privacy-invasive software
    Privacy-invasive software is a category of computer software that ignores users’ privacy and that is distributed with a specific intent, often of a commercial nature.
  • Computer and Internet Protocol Address Verifier
    The Computer and Internet Protocol Address Verifier (CIPAV) is a data gathering tool that the Federal Bureau of Investigation (FBI) uses to track and gather location data on suspects under electronic surveillance.
  • BonziBuddy
    BonziBuddy, stylized as BonziBUDDY, is a desktop assistant program distributed by Bonzi Software between 1999 and 2004.
  • Comet Cursor
    Comet Cursor was a software program manufactured by Comet Systems.