{"id":76,"date":"2006-06-15T14:34:18","date_gmt":"2006-06-15T19:34:18","guid":{"rendered":"https:\/\/www.zubairalexander.com\/stage\/?p=76"},"modified":"2015-03-03T15:04:33","modified_gmt":"2015-03-03T23:04:33","slug":"is-microsofts-definition-of-spyware-acceptable-to-security-experts","status":"publish","type":"post","link":"https:\/\/www.zubairalexander.com\/blog\/is-microsofts-definition-of-spyware-acceptable-to-security-experts\/","title":{"rendered":"Is Microsoft&#8217;s Definition of Spyware Acceptable to Security Experts?"},"content":{"rendered":"<p>According to Microsoft &#8220;Broadly speaking, spyware is deceptive software that is installed on a user&#8217;s computer without the user&#8217;s consent and has some malicious purpose.&#8221;<\/p>\n<p>Brian Livingston of WindowsSecrets.com disagrees with Microsoft definition. He states that &#8220;This is patently absurd. Many spyware programs, such as peer-to-peer file sharing applications, are knowingly installed with the user&#8217;s consent. The user downloads the software to get music, a screen saver, or whatever other benefit is promised. What makes a program spyware, among other things, is that it operates in ways that aren&#8217;t clearly disclosed before installation and it reports data back to a central server. Furthermore, this activity needn&#8217;t be malicious. Many spyware programs do nothing more than serving up targeted advertising or tracking anonymous marketing behavior. If a user wants such tracking functions, they might be fine. But if the user wasn&#8217;t clearly made aware of this, whether or not such software has a malicious purpose, it&#8217;s still spyware.&#8221;<\/p>\n<p>The majority of security experts will agree with Brian Livingston&#8217;s argument that spyware does not have to be installed without the user&#8217;s consent and spyware does not have to have a malicious purpose. Here are some of the definitions of &#8220;spyware&#8221; that you&#8217;ll find on the Web.<\/p>\n<p><b><a class=\"entrylink\" href=\"http:\/\/www.webopedia.com\/TERM\/s\/spyware.html\">Webopedia.com<\/a><\/b>: Any software that covertly gathers user information through the user&#8217;s Internet connection without his or her knowledge, usually for advertising purposes.<br \/>\n<b><a class=\"entrylink\" href=\"http:\/\/en.wikipedia.org\/wiki\/Spyware\">Wikipedia.org<\/a><\/b>: In simpler terms, spyware is a type of program that watches after what users do with their computer and then send this information to a hacker over the Internet.<br \/>\n<b><a class=\"entrylink\" href=\"http:\/\/reviews.cnet.com\/4520-3513_7-5759896-1.html\">CNET<\/a><\/b>: One generally agreed upon definition of spyware states that it is software that tracks personal information about you and transmits that information to third parties.<br \/>\n<b><a class=\"entrylink\" href=\"http:\/\/dictionary.reference.com\/browse\/spyware\">Dictionary.com<\/a><\/b>: Any software that covertly gathers information about a user while he\/she navigates the Internet and transmits the information to an individual or company that uses it for marketing or other purposes.<\/p>\n<p>Finally, The Anti-Spyware Coalition (ASC), headed by the Center for Democracy &amp; Technology with support from industry giants America Online Inc., EarthLink Inc., Microsoft Corp., and Yahoo Inc. among others, has released a document designed to establish definitions that will bring clarity to anti-spyware vendors. The ASC is a group dedicated to building a consensus about definitions and best practices in the debate surrounding spyware and other potentially unwanted technologies.<\/p>\n<p>ASC has two definitions of spyware. According to ASC, in its narrow sense, spyware is a term for Tracking Software deployed without adequate notice, consent, or control for the user. In its broader sense, Spyware is used as a synonym for what the ASC calls &#8220;Spyware and Other Potentially Unwanted Technologies.&#8221; In technical settings, ASC uses the term spyware only in its narrower sense and always marks it as such [spyware(narrow)]. However, the term spyware, when used generally in an ASC document always refers to the broader colloquial usage. This is how ASC defines spyware in the more common &#8220;broader sense.&#8221;<\/p>\n<p>Spyware and other potentially unwanted technologies are described as those that &#8220;impair users&#8217; control over: material changes that affect their user experience, privacy, or system security; use of their system resources, including what programs are installed on their computers; or collection, use, and distribution of their personal or otherwise sensitive information.&#8221;<\/p>\n<p>All this debate about spyware definition leads to the privacy issues that most people are concerned about. I&#8217;ve written a couple of articles on privacy issues that you might be interested in.<\/p>\n<ul>\n<li><a class=\"entrylink\" href=\"http:\/\/www.informit.com\/articles\/printerfriendly.asp?p=30697&amp;rl=1\">Tired of Windows XP Phoning Home?<\/a><\/li>\n<li><a class=\"entrylink\" href=\"http:\/\/www.informit.com\/articles\/printerfriendly.asp?p=174302\">A Closer Look at the Fine Print in Privacy Statements<\/a><br \/>\n<hr \/>\n<p><span style=\"font-family: Verdana; font-size: xx-small;\">Copyright \u00a92006 Zubair Alexander. All rights reserved.<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>According to Microsoft &#8220;Broadly speaking, spyware is deceptive software that is installed on a user&#8217;s computer without the user&#8217;s consent and has some malicious purpose.&#8221; Brian Livingston of WindowsSecrets.com disagrees with Microsoft definition. He states that &#8220;This is patently absurd. Many spyware programs, such as peer-to-peer file sharing applications, are knowingly installed with the user&#8217;s [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[43,78,24],"tags":[],"class_list":["post-76","post","type-post","status-publish","format-standard","hentry","category-articles","category-privacy","category-security"],"aioseo_notices":[],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/posts\/76","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/comments?post=76"}],"version-history":[{"count":0,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/posts\/76\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/media?parent=76"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/categories?post=76"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/tags?post=76"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}