Spyware’s likely suspect sites.



Spyware Confidential is writing of complaints from Wrestling fans of several wrestling related sites that have become sources of unsolicited spyware and adware installs. Some of them are aware of the spyware and encourage users to sign up for the ad-free service (pay) to avoid the problem. The spyware in many cases are installs that start without user intervention (or consent.)


The truth is there are several types of sites that are in the “usual suspects” list for adware and spyare installs, the first are xxx sites, the second are hacking/warez sites (such as the one reported a couple days back installing 180solutions software through a security vulnerability). The third and fourth are probably lyric sites and wrestling sites.

The first two are usually considered “the seedy side” of the net. Of course, the warez/hacking sites are illegal and xxx isn’t illegal but….

Anyway – lyric sites are probably, at worst running afoul of copyright law, but with wrestling fan sites, their users are complaining (who blames them). Suzi at Spyware Confidential says there must be a better way of paying the bills… I agree.

Related Posts

Blog Traffic Exchange Related Posts
  • Spyware news and musings It's funny, in the last couple days 180solutions had a blog post that was somewhat... what's the term I'm looking for ? well they were quite defensive and concerned about "anti-spyware zealots" about "Scanning companies" and trying to work with them to explain their business model. Of course, legal action......
  • How to Remove Safety AntiSpyware | Safety AntiSpyware Removal Guide Safety Antispyware is a rogue antivirus application that will scan your computer and claim that many files are infected with viruses and need to be deleted. The main problem is that these claims are falsified. Not only do you likely not have a virus (other than this monstrosity), but the......
  • How to Remove Personal Security | Personal Security Removal Guide Personal Security is a rogue antivirus application that comes from the same (dreaded) family as the Cyber Security rogue. It usually installs on the users computer without the permission of the computer user. Once installed on the system it will then perform supposed scans finding lots of virus infected files......
Blog Traffic Exchange Related Websites
  • Ny Web Design Services: Expose The Most Effective Providers Should you need a brand new web site design, you naturally turn to Yahoo, Google or different accessible serps to seek out and research online companies that provide the best Long island new york web design services to work with. You might be based in New York City, however your......
  • Spyware: The New Annoying Threat A friend called me one day, frustrated out of his mind that his computer was acting very strange.  When he opened his Internet Explorer, it sent him to a strange site and pop-up windows kept covering his screen.  He even complained about the performance of his Intel Pentium 4 computer......
  • Combating Computer Espionage Combating Computer EspionageCombating Computer Espionage In some cases, spies as well as covert operations are found in war grounds or politically tense regions. Now in spite of everything, you can find spies in addition to covert operations running undetected within your personal computer system as you use your computer along......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site