Identity theft affected nearly 15 million Americans last year, racking up 4 billion USD in losses. And if you were one of the victims, or if you know anyone who’s been subjected to credit card fraud, it’s highly likely that the underlying cause was spyware.
What is Spyware?
Spyware refers to software secretly installed on your machine with malicious intent such as stealing private information, credit card details, browsing history, and more data points. It’s designed to be discreet – you probably won’t know that it’s operating in the background as it has minimal impact on system resources.
When we talk about spyware, it’s important to understand that the term could mean several different things. Let’s take a quick look at them.
As the name suggests, keyloggers track your keyboard strokes and aim to detect things like passwords, financial details, or even just to keep tabs on your internet usage. Employers can use them to keep an eye on employee habits while hackers use them for more nefarious purposes.
Pleased about that shady free software you just downloaded online? There’s a high chance it might spring a nasty surprise in the form of malicious adware.
Adware secretly installs tracking cookies in your browser and mines web browsing history. The aim is to collect a critical mass of data so that it can be sold to third-party advertisers. It could also inundate you with pesky pop-up advertisements until you’re forced to make a purchase. As they say, there’s no such thing as a free lunch.
Trojans are a form of software disguised to appear as safe, innocuous programs. However, they wreak havoc the instant you download and install them on your device—revealing your personal details to the person who wrote the source code.
When did Spyware first appear?
The earliest references to spyware is widely believed to have originated in Usenet discussions in the mid-90s. But it was only in the early 2000s that spyware became synonymous with venomous software as it caught the attention of cybersecurity firms who recognized it as a real threat.
The first program designed to counter the harmful effects of spyware was released in 2000. Since then, the attacks have only grown in prevalence and magnitude.
How do I get Spyware?
A common method that hackers use to spread spyware is by exploiting zero-day vulnerabilities in your device. These vulnerabilities, or ‘bugs’ in common parlance, are deficiencies in existing software that haven’t been identified or patched up yet.
Hackers constantly scan popular software for such vulnerabilities and, in many cases, can identify them before the company itself. Consumers themselves may also exacerbate this problem by declining to download security fixes when available. That’s why we recommend that you keep your device updated at all times.
Another preferred technique is the use of phishing and spoofing. This is when hackers persuade you to engage in an action that will give them access to your device. Usually, it’s in the form of a convincing email that appears to be from someone you trust or a pop-up advertisement that redirects you to a malware-filled website.
How to remove spyware
If you think you’ve fallen victim to a spyware attack, then the best course of action would be to cease all activity on your device until it’s been safely exterminated or quarantined.
Start by running a deep system scan with your existing antivirus tool or other security software.
If you don’t have an antivirus software yet, here are two free ones you can use for the purpose:
Avast is one of the most popular antivirus tools in the world. It offers several paid tiers, but the free version is robust enough to get the job done. Avast offers real-time protection against viruses, spyware, and other forms of malware. It’s also able to alert you if your existing wifi connection is unsecure and can safely store all passwords, protecting you from keyloggers.
AVG is my personal mainstay and it’s been installed on all my devices for as long as I can remember. Like Avast, it offers a freemium product (I stick to the free one though). It’ll run in the background without slowing your device and includes scheduled scans for malware, real-time security updates, as well as malicious download alert warnings.
It’ll also tell you about risky wifi, although I feel it exaggerates these sometimes. Nonetheless, there’s no such thing as too much security.
To prevent spyware, adhere to security best practices
By some estimates, more than 350,000 new malware programs are created and released in the public sphere every single day. Antivirus tools certainly do their best to keep up, but it’s possible that a few will slip through the cracks.
As a general rule, you must ensure you stay one step ahead of cybercriminals. We mentioned earlier how it’s important to keep your device updated but there are other steps you can take too. For example, clicking on that email from the Nigerian widow promising you millions in unclaimed bank deposits isn’t a great idea.
Only open emails from addresses you know and trust. Try to avoid visiting strange websites, such as those that offer shady sport live streams or instant riches via online casinos. And don’t click on pesky pop-up advertisements, you could also go a step further and install an ad-blocker.
Stay safe out there: the internet can be the equivalent of the Wild West at times.