Spyware’s likely suspect sites.



Spyware Confidential is writing of complaints from Wrestling fans of several wrestling related sites that have become sources of unsolicited spyware and adware installs. Some of them are aware of the spyware and encourage users to sign up for the ad-free service (pay) to avoid the problem. The spyware in many cases are installs that start without user intervention (or consent.)


The truth is there are several types of sites that are in the “usual suspects” list for adware and spyare installs, the first are xxx sites, the second are hacking/warez sites (such as the one reported a couple days back installing 180solutions software through a security vulnerability). The third and fourth are probably lyric sites and wrestling sites.

The first two are usually considered “the seedy side” of the net. Of course, the warez/hacking sites are illegal and xxx isn’t illegal but….

Anyway – lyric sites are probably, at worst running afoul of copyright law, but with wrestling fan sites, their users are complaining (who blames them). Suzi at Spyware Confidential says there must be a better way of paying the bills… I agree.

Related Posts

Blog Traffic Exchange Related Posts
  • Another IE security flaw this one could lead to data theft I saw this earlier this afternoon at betanews.com there seems to be a flaw in the way Internet Explorer deals with css that could put your data at risk. According to this article it is a risk combined with Google Desktop. This can be "fixed" by disabling scripting or using......
  • Update on the Internet Explorer VML vulnerability Just catching up on the days VML vulnerability news from today.... It looks as though... the exploit is now MUCH more widespread this blog has some video of an infection, what's notable is that the first take was VERY UNEVENTFUL, it was used to stealthily install a keylogger. (So that......
  • How to Remove Personal Security | Personal Security Removal Guide Personal Security is a rogue antivirus application that comes from the same (dreaded) family as the Cyber Security rogue. It usually installs on the users computer without the permission of the computer user. Once installed on the system it will then perform supposed scans finding lots of virus infected files......
Blog Traffic Exchange Related Websites
  • Ny Web Design Services: Expose The Most Effective Providers Should you need a brand new web site design, you naturally turn to Yahoo, Google or different accessible serps to seek out and research online companies that provide the best Long island new york web design services to work with. You might be based in New York City, however your......
  • Having Your Bid On - Auctions Are Available It has benefited people that enjoy on-line shopping and enables them have opportunity to buy their favorite products below minimal charge. Unfortunately, buying goods through (bidding online) web sites has now become a possible danger. Given the significance of penny auction web sites on the web, there have come a......
  • Combating Computer Espionage Combating Computer EspionageCombating Computer Espionage In some cases, spies as well as covert operations are found in war grounds or politically tense regions. Now in spite of everything, you can find spies in addition to covert operations running undetected within your personal computer system as you use your computer along......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site