What is spyware? And how to remove it
Authored by a Symantec employee
Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information. Spyware is classified as a type of malware — malicious software designed to gain access to or damage your computer, often without your knowledge. Spyware gathers your personal information and relays it to advertisers, data firms, or external users.
Spyware is used for many purposes. Usually it aims to track and sell your internet usage data, capture your credit card or bank account information, or steal your personal identity. How? Spyware monitors your internet activity, tracking your login and password information, and spying on your sensitive information.
Some types of spyware can install additional software and change the settings on your device, so it’s important to use secure passwords and keep your devices updated.
If you’ve ever been a victim of identity theft or credit card fraud, you’re not alone. Cybercrime statistics tell the story:
- A total of 978 million people in 20 countries were affected by cybercrime in 2017, according to Norton Cyber Security Insights Report Global Results.
- Victims of cybercrime globally lost $172 billion.
Spyware contributed to those numbers.
Spyware is one of the most common threats on the internet. It can easily infect your device and it can be hard to identify. Spyware is a threat to businesses and individual users, since it can steal sensitive information and harm your network.
Check out our guide to help understand how spyware works, how to remove it, and how to help protect yourself or your business.
There are four main types of spyware. Each uses unique tactics to track you.
- Adware. This type of spyware tracks your browser history and downloads, with the intent of predicting what products or services you’re interested in. The adware will display advertisements for the same or related products or services to entice you to click or make a purchase. Adware is used for marketing purposes and can slow down your computer.
- Trojan. This kind of malicious software disguises itself as legitimate software. For example, Trojans may appear to be a Java or Flash Player update upon download. Trojan malware is controlled by third parties. It can be used to access sensitive information such as Social Security numbers and credit card information.
- Tracking cookies. These track the user’s web activities, such as searches, history, and downloads, for marketing purposes.
- System monitors. This type of spyware can capture just about everything you do on your computer. System monitors can record all keystrokes, emails, chat-room dialogs, websites visited, and programs run. System monitors are often disguised as freeware.
How do I get spyware?
Spyware can affect PCs, Macs, and iOS or Android devices. Although Windows operating systems may be more susceptible to attacks, attackers are becoming better at infiltrating Apple’s operating systems as well. Some of the most common ways your computer can become infected with spyware include these:
- Accepting a prompt or pop-up without reading it first
- Downloading software from an unreliable source
- Opening email attachments from unknown senders
- Pirating media such as movies, music, or games
How to recognize spyware on your device
Spyware can be difficult to recognize on your device. By its nature, it’s meant to be deceptive and hard to find. But there are clues that can help you identify whether you’ve been infected by spyware. You may have a spyware issue if your computer shows these symptoms.
- Your device is slow or crashes unexpectedly.
- Your device is running out of hard drive space.
- You get pop-ups when you are online or offline.
How to remove spyware
If you think your device is infected with spyware, run a scan with your current security software to make sure it has cleaned up everything it can. Next, download and run a virus removal tool, such as the free Norton Power Eraser.
There are also other reputable anti-spyware removal tools. Some of them work only when you manually start the scan. Others continuously monitor your computer to make sure spyware can’t modify or monitor your information.
How to help prevent spyware?
Here are four main steps to help prevent spyware.
● Don’t open emails from unknown senders.
● Don’t download files from untrustworthy sources.
● Don’t click on pop-up advertisements.
● Use reputable antivirus software.
Spyware can be harmful, but it can be removed and prevented by being cautious and using an antivirus tool.
If you’ve been infected with spyware, take steps to remove it. Be proactive by changing your passwords and notifying your bank to watch for fraudulent activity.
Don’t wait until a threat strikes.
Security threats and malware lurk on Windows PCs, Macs, and Android and iOS devices. If you use more than one device – like most of us do – you need an all-in-one security suite. Meet Norton Security Premium.
Enjoy peace of mind on every device you use with Norton Security Premium.
1Symantec, “Norton Cyber Security Insights Report 2017,” January 2018.
Symantec Corporation, the world’s leading cyber security company, allows organizations, governments, and people to secure their most important data wherever it lives. More than 50 million people and families rely on Symantec’s Norton and LifeLock comprehensive digital safety platform to help protect their personal information, devices, home networks, and identities.
Copyright © 2019 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Norton, Norton by Symantec, LifeLock, and the LockMan Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Google Chrome and Android are trademarks of Google, LLC. Mac, iPhone and iPad are trademarks of Apple Inc. Microsoft and the Windows logo are trademarks of Microsoft Corporation in the United States and/or other countries. The Android robot is reproduced and/or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other company names and product names are registered trademarks or trademarks of each company.