Introduction to Spyware, Adware, and Scareware

In the previous article, I discussed malware, including its type virus, worm, ransomware, trojan horses, logic bomb, back door, and rootkits. In this article, we should discuss malware types spyware, adware and scareware.


A computer installs this software without the end-user knowledge and enables a criminal to get information about the user’s computer activities. The activities of spyware are keystroke collection, data capture, and activity trackers. The software violates the end user’s privacy and has the potential to be abused. So, it’s a controversial software and sometimes the computing device security settings change with this software. It usually merges itself with legitimate software or with Trojan horses. Moreover, many shareware websites are full of spyware.

Tracking software is inoffensive software and organizations use such software to check employees browsing activities. Parents may also use a keylogger to check their kids’ activities on the internet. The advertiser uses a cookie for tracking.

So, If the end-user remains to inform that information is collected with software, such data collection programs are not spyware. Spyware detection is too difficult. Often, the speed is the first signs to a user, the infected computer or device with spyware is a noticeable decrease in a processor or network connection speeds and the case of mobile device data usage and battery life is decreasing too much.


Adware is an application which typically displays advertising banners while a program is running and generate revenue for its authors. It also analyzes user interests by tracking the websites visited and then send pop-up advertising relevant to those sites. Some software automatically installs Adware with its installation. Some adware only shows advertisements, but it is also common for adware to come with spyware. Adware is available for computers and mobile.


The scareware is a malware which tricks victims into purchasing and downloading useless and potentially dangerous software base on fear. Scareware generates pop-up windows that look like an operating system dialogue windows.

The pop-up window conveys messages, generally stating that the system is at risk and antivirus or anti-spyware software, a firewall application or a registry cleaner is required. But, actually, there are no problems exist, and if the user agrees and allows the mentioned program to execute, the malware infects their system.