Spyware’s likely suspect sites.



Spyware Confidential is writing of complaints from Wrestling fans of several wrestling related sites that have become sources of unsolicited spyware and adware installs. Some of them are aware of the spyware and encourage users to sign up for the ad-free service (pay) to avoid the problem. The spyware in many cases are installs that start without user intervention (or consent.)


The truth is there are several types of sites that are in the “usual suspects” list for adware and spyare installs, the first are xxx sites, the second are hacking/warez sites (such as the one reported a couple days back installing 180solutions software through a security vulnerability). The third and fourth are probably lyric sites and wrestling sites.

The first two are usually considered “the seedy side” of the net. Of course, the warez/hacking sites are illegal and xxx isn’t illegal but….

Anyway – lyric sites are probably, at worst running afoul of copyright law, but with wrestling fan sites, their users are complaining (who blames them). Suzi at Spyware Confidential says there must be a better way of paying the bills… I agree.

Related Posts

Blog Traffic Exchange Related Posts
  • Network Security guide for the home or small business network - Part 12 - Antispyware I've talked about Antivirus software as an essential. Today we're going to look at Antispyware software. There is a difference. By definition a virus is a piece of software that infects other files or copies itself. A worm is a virus that spreads without user intervention. (From one open network......
  • Spyware news and musings It's funny, in the last couple days 180solutions had a blog post that was somewhat... what's the term I'm looking for ? well they were quite defensive and concerned about "anti-spyware zealots" about "Scanning companies" and trying to work with them to explain their business model. Of course, legal action......
  • How to Remove Personal Security | Personal Security Removal Guide Personal Security is a rogue antivirus application that comes from the same (dreaded) family as the Cyber Security rogue. It usually installs on the users computer without the permission of the computer user. Once installed on the system it will then perform supposed scans finding lots of virus infected files......
Blog Traffic Exchange Related Websites
  • Having Your Bid On - Auctions Are Available It has benefited people that enjoy on-line shopping and enables them have opportunity to buy their favorite products below minimal charge. Unfortunately, buying goods through (bidding online) web sites has now become a possible danger. Given the significance of penny auction web sites on the web, there have come a......
  • Combating Computer Espionage Combating Computer EspionageCombating Computer Espionage In some cases, spies as well as covert operations are found in war grounds or politically tense regions. Now in spite of everything, you can find spies in addition to covert operations running undetected within your personal computer system as you use your computer along......
  • RegCure Developed to utilize the most current technology in registry cleaning, RegCure has been designed to provide computer users with the most advanced prevention and maintenance tool available. Offering the most comprehensive feature set on the market and free customer support, RegCure is the PC fix preferred by PC users. RegCure......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site