Additional information (sp)
These attacks are a type of phising attacks in which a malicious intruder changes the name of the sender. The message then looks as though it comes from a trusted source. Often these attacks are being used to trick the receiver into clicking a malicious hyperlink or installing a malicious file.
A successful spoofing attack can have serious financial and/or personal consequences and can take place over a longer period of time.
Prevention exists of always staying alert towards messages in which is being asked to click on something or to download something, also if they seem to come from a person that you know or trust.
Spyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission. It is done by performing a set of operations without the machine's owner knowing about it. Actions spyware performs include advertising, collection of personal information and changing user configuration settings.
The most common way for spyware to get into the computer is through freeware and shareware as a bundled hidden component. Spyware may also be secretly installed when a user opens an infected e-mail attachment or through p2p (file-sharing) networks. Some spyware can be installed as part of legitimate programs that seek to track a user’s activity.
It can f.e. include Trojans, tracking cookies and keyloggers.
Most commercial antivirus software programs include features to help detect and eliminate spyware and other malware. In addition, modern operating systems include features to make it harder for criminals to install malware without the owner’s knowledge.
Social (and other) things: