Spyware Learning Guide

This guide is a compilation of resources that explain what spyware is, how it attacks and most importantly what you can to do to win the war on spyware.

As spyware continues to threaten the stability of corporate infrastructures, it's crucial to understand how this malicious software works and how to defend against it. This guide is a compilation of resources that explain what spyware is, how it attacks and most importantly what you can to do to win the war on spyware. Send us an e-mail to let us know what other guides you'd like to see on SearchSecurity.com.

TABLE OF CONTENTS
   Introduction to spyware
   How spyware attacks
   Effects of spyware
   Combating spyware
   The future of spyware
   More security learning resources

  Introduction to spyware  Return to Table of Contents
  • Glossary Definition: Spyware
  • Glossary Definition: Adware
  • Glossary Definition: Malware
  • Glossary Definition: Freeware
  • Glossary Definition: PUP
  • Advice: Malware signature updates
  • Article: A wolf in sheep's clothing, Part 1
  • Article: A wolf in sheep's clothing Part 2
  • Article: Who best to define spyware?
  • Article: Expert's weigh in on spyware's defining moment
  • Article: What is spyware? Industry group has an answer.
  • Column: Spyware vs. viruses: Two different fights
  • Column: Security Bytes: Group takes stab at defining spyware
  • Quiz: Is spyware getting the best of you?
  How spyware attacks  Return to Table of Contents
  Effects of spyware  Return to Table of Contents
  • Advice: Spyware's impact on the network
  • Advice: Is spyware allowing someone to read my e-mail en route to my client?
  • Article: Combating DNS attacks in your own backyard
  • Article: Spyware in 87% of corporate PCs
  • Article: Spyware costs plague SMBs
  • Article: Spyware and adware rage on
  • Article: Security vendor warns of identity theft ring
  • Article: Spyware Survey: Coming to terms with the problem
  • Case Study : Hardcore spyware among the missing
  • Tip: Hijacked browser
  • Tip: The ever-constant restart
  Combating spyware  Return to Table of Contents
  The future of spyware  Return to Table of Contents
  • Article: Wave of defection for antispyware consortium
  • Article: Spyware shifts from marketing to robbery
  • Article: Symantec threat report: A closer look
  • Article: Bots in the A/C, spyware in the 'fridge
  • Feature: ISP liability: Does the bot stop here?
  • Feature: ISP liability, Part 2: Does the bot stop here?
  • Tip: Ditch IE?
  • Tip: Is Firefox spyware's next target
More Security Learning Resources
SECURITY SCHOOL LEARNING GUIDES CHECKLISTS GLOSSARY ASK THE EXPERTS

Read more on Hackers and cybercrime prevention

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close